Which of the following is the BEST way to protect Personally Identifiable Information (PII) from being exploited
due to vulnerabilities of varying web applications?
A.
Use cryptographic storage to store all PII
B.
Use full disk encryption on all hard drives to protect PII
C.
Use encrypted communications protocols to transmit PII
D.
Use a security token to log into all Web applications that use PII
C