A company stores sensitive contract documents in a cloud storage service. To ensure the integrity of these documents over time, which mechanism should be employed?
Encrypting the documents to prevent unauthorized reading of the contents
Using digital signatures to validate the documents have not been modified
Implementing file system permissions to restrict access to the documents
Employing hashing algorithms to generate and compare hashes of the documents