brittneyaxel3211 brittneyaxel3211 30-11-2022 Computers and Technology contestada which of the following should you set up to ensure encrypted files can still be decrypted if the original user account becomes corrupted?