A financial institution has reported a significant discrepancy in its transaction records, indicating possible unauthorized modifications. Which control should be prioritized to verify and safeguard the integrity of these records?
You selected this option
Perform regular backups of the transaction records.
You selected this option
Encrypt all transaction data to prevent unauthorized access.
You selected this option
Establish strict access control lists for all financial records.
You selected this option
Implement cryptographic hash functions to compare current records against trusted hash values.
Data integrity can be ensured by using cryptographic hash functions to compute a unique hash value for each record. Any modification to a record would result in a different hash, thus detecting unauthorized changes. Access control lists help regulate who can modify data, but do not detect changes. Regular backups are necessary for data recovery, not for integrity checking. Encrypting data secures it from unauthorized access but does not cover integrity checks.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are cryptographic hash functions and how do they work?
Open an interactive chat with Bash
Why is it important to use hash values for data verification?
Open an interactive chat with Bash
What are the limitations of using access control lists for safeguarding data?