Which of the following measures best supports the integrity component of the CIA triad, ensuring that data remains unaltered during transmission?
Implementing robust firewall rules to regulate network traffic
Enforcing multi-factor authentication for data access
Using hash functions to verify the data integrity
Encrypting data using robust encryption algorithms