Which one of the following should be employed to protect data against undetected corruption? seenagape 9 years ago Which one of the following should be employed to protect data against undetected corruption? A. Non-repudiation B. Encryption C. Authentication D. Integrity ← Previous question Next question →