Which one of the following should be employed to protect data against undetected corruption? admin 12 years ago Which one of the following should be employed to protect data against undetected corruption? A.Non-repudiation B.Encryption C.Authentication D.Integrity ← Previous question Next question →