0 votes
in Threat Modeling by
Which of the following is used to retain integrity in a software?

a) Encryption

b) Hashing

c) Recovery

d) Redundancy

1 Answer

0 votes
by

d) Redundancy

by
a) Encryption
...