A financial services company encrypts all cloud-stored customer data. However, they are concerned about data integrity in case of corruption or unauthorized modifications. What is the best approach to verify data integrity?
Answer: Use cryptographic hashing (e.g., SHA-256) for verification
Explanation:
Hashing provides a unique fingerprint for data, allowing verification of whether it has been altered without requiring decryption.
Answer: Use cryptographic hashing (e.g., SHA-256) for verification
Explanation:
Hashing provides a unique fingerprint for data, allowing verification of whether it has been altered without requiring decryption.