Using a protocol analyzer, a security consultant was able to capture employee’s credentials. Which of thefollowing should the consultant recommend to the company, in order to mitigate the risk of employees
credentials being captured in the same manner in the future?
A.
Wiping of remnant data
B.
Hashing and encryption of data in-use
C.
Encryption of data in-transit
D.
Hashing of data at-rest