A systems administrator needs to configure an email client to ensure data integrity of the email messages.
Which of the following provides the BEST mechanism to achieve this goal?
A. Cyclic redundancy check
B. SHA-1 hashes
C. SHA-256 hashes
D. Digital signature
SHA-256 is used in some of the most popular authentication and encryption protocols, including SSL, TLS, IPsec, SSH, and PGP.