header bg

Question:

Which of the following detection methods is Jerry using in the case that Jerry runs a tool to scan a clean system to create a database. The tool then scans the system again and compares the second scan to the clean database?

A Integrity-based
Explaination