Which of the following can be used to ensure that sensi…

Which of the following can be used to ensure that sensitive records stored on a backend server can only be
accessed by a front end server with the appropriate record key?

Which of the following can be used to ensure that sensitive records stored on a backend server can only be
accessed by a front end server with the appropriate record key?

A.
File encryption

B.
Storage encryption

C.
Database encryption

D.
Full disk encryption



Leave a Reply 0

Your email address will not be published. Required fields are marked *