Sara, a security administrator, manually hashes all network device configuration files daily and compares them
to the previous days’ hashes. Which of the following security concepts is Sara using?

A.
Confidentiality
B.
Compliance
C.
Integrity
D.
Availability
Explanation:
Integrity means the message can’t be altered without detection.