PrepAway - Latest Free Exam Questions & Answers

2 Comments on “Which one of the following should be employed to protect data against undetected corruption?

  1. Ahmed says:

    Integrity is not a wrench that can be ’employed’. Hashing algorithms are employed to find out if a message has been compromised during transmission. Nothing can ‘stop’ or ‘protect’ message or data from being compromised.




    0



    0

Leave a Reply