When preparing to distribute the final penetration testing report to the intended stakeholders, which method would BEST ensure both the confidentiality and integrity of the report?
Uploading the report to a common network drive which the stakeholders have access to without using additional encryption.
Sending the report via a secure file transfer method with encryption and providing a checksum or cryptographic hash for integrity checking.
Encrypting the report as an email attachment using an encrypted email service without providing an additional integrity check.
Physically mailing a password-protected USB drive containing the report to the stakeholders.