Which two strategies are used to protect personally identifiable information?

Which two strategies are used to protect personally identifiable information? (Choose two.)
A. Encrypt data in transit.
B. Encrypt hash values of data.
C. Encrypt data at rest.
D. Only hash usernames and passwords for efficient lookup.
E. Only encrypt usernames and passwords for efficient lookup.

cisco-exams

One thought on “Which two strategies are used to protect personally identifiable information?

  1. answer: AC

    Encrypting hash values makes no sense whatsoever.

    Encrypt data in transit
    Encrypt data at rest

Leave a Reply

Your email address will not be published. Required fields are marked *


The reCAPTCHA verification period has expired. Please reload the page.