Which of the following is an effective way to ensure the integrity of file transfers in a peer-to-peer (P2P) computing environment?
A. Connect the client computers in the environment to a jump server.
B. Ensure the files transferred through an intrusion detection system (IDS).
C. Encrypt the packets shared between peers within the environment.
D. Associate a message authentication code with each file transferred.
A. Connect the client computers in the environment to a jump server.
B. Ensure the files transferred through an intrusion detection system (IDS).
C. Encrypt the packets shared between peers within the environment.
D. Associate a message authentication code with each file transferred.