Which of the following controls meets this goal?

A sensitive database needs its cryptographic integrity upheld. Which of the following controls
meets this goal? (Select TWO).

A sensitive database needs its cryptographic integrity upheld. Which of the following controls
meets this goal? (Select TWO).

A.
Data signing

B.
Encryption

C.
Perfect forward secrecy

D.
Steganography

E.
Data vaulting

F.
RBAC

G.
Lock and key



Leave a Reply 0

Your email address will not be published. Required fields are marked *