Which one of the following should be employed to protect data against undetected corruption?

Which one of the following should be employed to protect data against undetected corruption?

Which one of the following should be employed to protect data against undetected corruption?

A.
Non-repudiation

B.
Encryption

C.
Authentication

D.
Integrity



Leave a Reply 2

Your email address will not be published. Required fields are marked *

sixteen − 6 =


Jamal Ahmed

Jamal Ahmed

check B

Ahmed

Ahmed

Integrity is not a wrench that can be ’employed’. Hashing algorithms are employed to find out if a message has been compromised during transmission. Nothing can ‘stop’ or ‘protect’ message or data from being compromised.