A systems administrator needs to configure an email client to ensure data integrity of the email messages.
Which of the following provides the BEST mechanism to achieve this goal?
A . Cyclic redundancy check
B . SHA-1 hashes
C . SHA-256 hashes
D . Digital signature
Answer: A
Explanation:
Reference: https://www.fsl.cs.sunysb.edu/docs/integrity-storagess05/integrity.html