| Exam 210-260 | Question id=684 | Security Concepts |
Which technology can be used to rate data fidelity and to provide an authenticated hash for data?
| A. |
file reputation | |
| B. |
file analysis | |
| C. |
signature updates | |
| D. |
network blocking |