To determine whether a log file was modified, deleted, or unchanged after CloudTrail delivered it, you can use ____.
A. trusted signers
B. optimistic locking
C. integrity validation
D. root credentialing
A. trusted signers
B. optimistic locking
C. integrity validation
D. root credentialing