| Exam 210-260 | Question id=684 | Security Concepts | 
        Which technology can be used to rate data fidelity and to provide an authenticated hash for data?
      
| A. | file reputation | |
| B. | file analysis | |
| C. | signature updates | |
| D. | network blocking |