What are two acceptable methods to protect sensitive user data?
A. Hashing
B. URL Encoding
C. DES Encryption
D. AES Encryption
E. Base 64 Encoding
What are two acceptable methods to protect sensitive user data?
A. Hashing
B. URL Encoding
C. DES Encryption
D. AES Encryption
E. Base 64 Encoding