Which two strategies are used to protect personally identifiable information? (Choose two.)
A) Encrypt data in transit.
B) Encrypt hash values of data.
C) Encrypt data at rest.
D) Only hash usernames and passwords for efficient lookup.
E) Only encrypt usernames and passwords for efficient lookup.
Correct Answer:
Verified
Q39: Q40: Which two types of storage are supported Q41: An automated solution is needed to configure Q42: Q43: A developer needs to configure an environment Q45: Q46: Which HTTP status code indicates that a Q47: An application has initiated an OAuth authorization Q48: There is a requirement to securely store Q49: Unlock this Answer For Free Now! View this answer and more for free by performing one of the following actions Scan the QR code to install the App and get 2 free unlocks Unlock quizzes for free by uploading documents![]()
![]()
![]()
![]()