A sensitive database needs its cryptographic integrity upheld. Which of the following controls
meets this goal? (Select TWO).
A.
Data signing
B.
Encryption
C.
Perfect forward secrecy
D.
Steganography
E.
Data vaulting
F.
RBAC
G.
Lock and key
A sensitive database needs its cryptographic integrity upheld. Which of the following controls
meets this goal? (Select TWO).
A sensitive database needs its cryptographic integrity upheld. Which of the following controls
meets this goal? (Select TWO).
A.
Data signing
B.
Encryption
C.
Perfect forward secrecy
D.
Steganography
E.
Data vaulting
F.
RBAC
G.
Lock and key