Which one of the following should be employed to protect data against undetected corruption?
A.
Non-repudiation
B.
Encryption
C.
Authentication
D.
Integrity
Which one of the following should be employed to protect data against undetected corruption?
Which one of the following should be employed to protect data against undetected corruption?
A.
Non-repudiation
B.
Encryption
C.
Authentication
D.
Integrity
check B
Integrity is not a wrench that can be ’employed’. Hashing algorithms are employed to find out if a message has been compromised during transmission. Nothing can ‘stop’ or ‘protect’ message or data from being compromised.