Which of the following would a security administrator use to verify the integrity of a file?
![PrepAway - Latest Free Exam Questions & Answers](https://www.briefmenow.org/img/pa5.jpg)
A.
Time stamp
B.
MAC times
C.
File descriptor
D.
Hash
Explanation:
Hashing refers to the hash algorithms used in cryptography. It is used to store data, such as hash tables and it
is a one-way transformation in order to validate the integrity of data.