Users of specific systems are reporting that their data has been corrupted. After a recent patch update to those systems, the users are still reporting issues of data being corrupt. Which of the following assessment techniques need to be performed to identify the issue?
A.
Hardware baseline review
B.
Vulnerability scan
C.
Data integrity check
D.
Penetration testing