Which of the following is an essential element of the audit trail in an electronic data interchange (EDI) system?
a. Encrypted hash totals that authenticate messages.
b. Disaster recovery plans that ensure proper backup of files.
c. Activity logs that indicate failed transactions.
d. Hardware security modules that store sensitive data.