Which two strategies are used to protect personally identifiable information? (Choose two.)
Which two strategies are used to protect personally identifiable information? (Choose two.)
A . Encrypt data in transit.
B . Encrypt hash values of data.
C . Encrypt data at rest.
D . Only hash usernames and passwords for efficient lookup.
E . Only encrypt usernames and passwords for efficient lookup.
Answer: AC
Latest 350-901 Dumps Valid Version with 169 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments