Which two strategie...
 
Notifications
Clear all

Which two strategies are used to protect personally identifiable information? (Choose two.)

1 Posts
1 Users
0 Likes
107 Views
(@siwekphilip)
Posts: 730
Noble Member
Topic starter
 

Which two strategies are used to protect personally identifiable information? (Choose two.)

  • A . Encrypt data in transit.
    B. Encrypt hash values of data.
    C. Encrypt data at rest.
    D. Only hash usernames and passwords for efficient lookup.
    E. Only encrypt usernames and passwords for efficient lookup.

Show Answer Hide Answer

Suggested Answer: AC
 
Posted : 31/01/2023 12:20 am

Latest Cisco 350-901 Dumps Valid Version

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Share: