Which of the following is the BEST way to protect Personally Identifiable Information (PII) from being exploited due to vulnerabilities of varying web applications?

Posted by: Pdfprep Category: 312-50v10 Tags: , ,

Which of the following is the BEST way to protect Personally Identifiable Information (PII) from being exploited due to vulnerabilities of varying web applications?
A . Use cryptographic storage to store all PII
B . Use full disk encryption on all hard drives to protect PII
C . Use encrypted communications protocols to transmit PII
D . Use a security token to log into all Web applications that use PII

Answer: C

Leave a Reply

Your email address will not be published.