A company believes that its database may have been compromised. What is a simple tool they can use to confirm database integrity?
a. Conduct artifact analysis
b. Database authentication
c. Database checksum
d. Review audit report