Implementing Cisco Network Security (IINS v3.0) (#64)

Which technology can be used to rate data fidelity and to provide an authenticated hash for data?

file reputation
file analysis
signature updates
network blocking