Which one of the following should be employed to protect data against undetected corruption?
A.
Non-repudiation
B.
Encryption
C.
Authentication
D.
Integrity
Which one of the following should be employed to protect data against undetected corruption?
Which one of the following should be employed to protect data against undetected corruption?
A.
Non-repudiation
B.
Encryption
C.
Authentication
D.
Integrity
I think correct answer should be B.Encryption
Integrity can’t be employed, but encryption can be.