When preparing to distribute the final penetration testing report to the intended stakeholders, which method would BEST ensure both the confidentiality and integrity of the report?
Encrypting the report as an email attachment using an encrypted email service without providing an additional integrity check.
Sending the report via a secure file transfer method with encryption and providing a checksum or cryptographic hash for integrity checking.
Uploading the report to a common network drive which the stakeholders have access to without using additional encryption.
Physically mailing a password-protected USB drive containing the report to the stakeholders.