You have deployed an EMC Data Domain system in a customer environment. Recently, the
customer expressed concerns regarding data integrity issues.
Which Data Domain system attributes protect against stored data corruption?

A.
Checksum, self-healing file system, and RAID 6
B.
Checksum, RAID 5, and snapshots
C.
Compression, NVRAM, and snapshots
D.
File system verification, snapshots, and RAID 6