Which of the following would Matt, a security administrator, use to encrypt transmissions from an internal database…?