Exam 210-260 | Question id=684 | Security Concepts |
Which technology can be used to rate data fidelity and to provide an authenticated hash for data?
A. |
file reputation | |
B. |
file analysis | |
C. |
signature updates | |
D. |
network blocking |