Prev Question
Next Question

Which of the following may be used prior to encryption of information stored in a database if only weak encryption algorithms are allowed?

A. LUN Masking

B. Obfuscation

C. Access Control Lists

D. Hashing

Explanation:

Prev Question
Next Question

Leave a Reply

Your email address will not be published. Required fields are marked *