Which one of the following should be employed to protect data against undetected corruption?

Which one of the following should be employed to protect data against undetected corruption?

Which one of the following should be employed to protect data against undetected corruption?

A.
Non-repudiation

B.
Encryption

C.
Authentication

D.
Integrity



Leave a Reply 0

Your email address will not be published. Required fields are marked *

twenty − eighteen =


S K Char

S K Char

I think correct answer should be B.Encryption

Integrity can’t be employed, but encryption can be.