Watch this video on YouTube
The organization's information security manager is considering adding an extra layer of protection to a sensitive document's password. To ensure that the document remains both secure and unaltered, which technique would be the MOST effective?