Sara, a security administrator, manually hashes all network device configuration files daily and
compares them to the previous days’ hashes. Which of the following security concepts is Sara
using?
A.
Confidentiality
B.
Compliance
C.
Integrity
D.
Availability