0 votes
in Threat Modeling by
Which of the following is used to retain integrity in a software?

a) Encryption

b) Hashing

c) Recovery

d) Redundancy

1 Answer

0 votes
by

d) Redundancy

by
a) Encryption

Related questions

0 votes
asked Mar 18, 2021 in Threat Modeling by sharadyadav1986
0 votes
asked Mar 17, 2021 in Threat Modeling by sharadyadav1986
...