bellebug6165 bellebug6165 19-02-2024 Computers and Technology contestada Which one of the following should be employed to protect data against undetected corruption?A. Non-repudiationB. EncryptionC. AuthenticationD. Integrity