Which one of the following should be employed to protect data against undetected corruption?

Which one of the following should be employed to protect data against undetected corruption?

Which one of the following should be employed to protect data against undetected corruption?

A.
Non-repudiation

B.
Encryption

C.
Authentication

D.
Integrity



Leave a Reply to S K Char Cancel reply0

Your email address will not be published. Required fields are marked *

twenty + 4 =


S K Char

S K Char

I think correct answer should be B.Encryption

Integrity can’t be employed, but encryption can be.