Which of the following measures best supports the integrity component of the CIA triad, ensuring that data remains unaltered during transmission?
Encrypting data using robust encryption algorithms
Using hash functions to verify the data integrity
Implementing robust firewall rules to regulate network traffic
Enforcing multi-factor authentication for data access