Which one of the following should be employed to protect data against undetected corruption?
A. Non-repudiation
B. Encryption
C. Authentication
D. Integrity
2 Comments on “Which one of the following should be employed to protect data against undetected corruption?”
Jamal Ahmedsays:
check B
0
0
Ahmedsays:
Integrity is not a wrench that can be ’employed’. Hashing algorithms are employed to find out if a message has been compromised during transmission. Nothing can ‘stop’ or ‘protect’ message or data from being compromised.
check B
0
0
Integrity is not a wrench that can be ’employed’. Hashing algorithms are employed to find out if a message has been compromised during transmission. Nothing can ‘stop’ or ‘protect’ message or data from being compromised.
0
0