The use of strong authentication, the encryption of Personally Identifiable Information (PII) on
database servers, application security reviews, and the encryption of data transmitted across
networks provide
A.
data integrity.
B.
defense in depth.
C.
data availability.
D.
non-repudiation.