Which of the following techniques will identify if computer files have been changed?
Network sniffing
Permission sets
Integrity checking hashes
Firewall alerts
Submit