Which of the following is not used to ensure integrity?
A.
Firewall services
B.
Communications security management
C.
Intrusion detection services
D.
Compliance monitoring services
Explanation:
Compliance monitoring services are not part of the process used to
ensure integrity.