Which two strategies are used to protect personally identifiable information? (Choose two.)

Which two strategies are used to protect personally identifiable information? (Choose two.)
A . Encrypt data in transit.
B . Encrypt hash values of data.
C . Encrypt data at rest.
D . Only hash usernames and passwords for efficient lookup.
E . Only encrypt usernames and passwords for efficient lookup.

Answer: AC

Latest 350-901 Dumps Valid Version with 169 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments