PdfPrep.com

Which two strategies are used to protect personally identifiable information? (Choose two.)

Which two strategies are used to protect personally identifiable information? (Choose two.)
A . Encrypt data in transit.
B . Encrypt hash values of data.
C . Encrypt data at rest.
D . Only hash usernames and passwords for efficient lookup.
E . Only encrypt usernames and passwords for efficient lookup.

Answer: AB

Exit mobile version