Which one of the following should be employed to protect data against undetected corruption? admin 13 years ago Which one of the following should be employed to protect data against undetected corruption? A.Non-repudiation B.Encryption C.Authentication D.Integrity ← Previous question Next question →