"Message integrity" is the correct answer. A keyed hash also called a MAC (message authentication code) is used for integrity protection.
"Message non-repudiation" is incorrect. Non-repudation is assured by either peer authentication or if only server authentication is used (the common practice), the client's knowledge of a user name/password, etc, required by the application.
"Message confidentiality" is incorrect. The Message confidentiality is protected by encryption.
"Message interleave checking" is incorrect. This is a nonsense term included as a distractor.
CBK, p. 496 - 497
Last modified 6/21/2007 R. Austin Thanks to Chris LaPole for his great feedback
Contributors:Rakesh Sud, Christian Vezina
My doubt:Wasn’t able to understand the explanation provided here for Non-repudiation (marked in Blue). My very limited understanding regarding Non-repudiation was that it can only be provided using Signatures or by using the private key to encrypt/sign the message.