terryhgivens2347 terryhgivens2347 30-04-2024 Computers and Technology Answered Which of the following is likely to be accepted by a poorly designed application thereby leading to improper disclosure of data? A) public key B) asymmetric encryption C) key escrow D) SQL injection E) SHA1 hash