header bg

Question:

Confidentiality, integrity, and availability are all security components. Which technique ensures integrity?

A Hashing
Explaination

A hash is a one-of-a-kind numerical string generated by a hashing algorithm on a given piece of data and used to verify data integrity. Hashes are commonly used to verify the integrity of files after download (compared to the hash value on the site before download) and/or to accumulate password values. A one-way algorithm generates hashes.