Which one of the following should be employed to protect data against undetected corruption? seenagape 10 years ago Which one of the following should be employed to protect data against undetected corruption? A. Non-repudiation B. Encryption C. Authentication D. Integrity ← Previous question Next question →