Which two strategies are used to protect personally identifiable information? (Choose two.)

Posted by: Pdfprep Category: 350-901 Tags: , ,

Which two strategies are used to protect personally identifiable information? (Choose two.)
A . Encrypt data in transit.
B . Encrypt hash values of data.
C . Encrypt data at rest.
D . Only hash usernames and passwords for efficient lookup.
E . Only encrypt usernames and passwords for efficient lookup.

Answer: AB

Leave a Reply

Your email address will not be published.