ISC Exam Questions

Which one of the following should be employed to protect data against undetected corruption?

Which one of the following should be employed to protect data against undetected corruption?

A.
Non-repudiation

B.
Encryption

C.
Authentication

D.
Integrity