Shonda is concerned that someone might change the data that is being sent as a file. Which of the following would help Shonda learn ways to be sure that the data received is the same as the data that was sent?

digital signatures
data at rest
symmetrical encryption
asymmetrical encryption

digital signatures

To ensure that the data received is the same as the data that was sent, Shonda can consider using digital signatures. Digital signatures provide a way to verify the authenticity and integrity of electronic documents or files. It involves using cryptographic algorithms to generate a unique digital signature for the data being sent. The recipient can then verify the signature to ensure that the data has not been tampered with during transmission.

To determine the ways to ensure data integrity, Shonda can consider the following options:

1. Digital Signatures: One method to ensure data integrity is through the use of digital signatures. Digital signatures use asymmetric encryption techniques, typically involving public and private key pairs. By adding a digital signature to a file, Shonda can verify that the data received hasn't been tampered with, as any changes made to the file will invalidate the signature.

To learn more about digital signatures, Shonda can refer to resources that explain the concept of public-key cryptography and how digital signatures are created and verified.

2. Symmetric Encryption: Symmetric encryption is a method where the same key is used for both encryption and decryption of data. While symmetric encryption can provide data confidentiality, it doesn't directly address data integrity. Shonda may need to explore other methods, in addition to symmetric encryption, to ensure data is not altered during transmission.

To understand how symmetric encryption works and its limitations in terms of data integrity, Shonda can reference materials that explain symmetric encryption algorithms, such as AES (Advanced Encryption Standard).

3. Asymmetric Encryption: Asymmetric encryption, also known as public-key encryption, uses different keys for encryption and decryption. While it primarily enables secure communication and confidentiality, asymmetric encryption algorithms can also be used to ensure data integrity. By encrypting a digest or hash of the original data with the sender's private key, Shonda can verify that the received data matches by decrypting it with the sender's public key.

In order to gain a deeper understanding of asymmetric encryption and how it can be utilized for data integrity, Shonda can consult educational resources that cover topics like RSA or Elliptic Curve Cryptography (ECC).

By investigating these various methods, Shonda can gather the necessary knowledge to better protect data integrity during transmission and identify which method(s) suit her needs best.