ISC Exam Questions

which of the following?

Data leakage of sensitive information is MOST often concealed by which of the following?

A.
Secure Sockets Layer (SSL)

B.
Secure Hash Algorithm (SHA)

C.
Wired Equivalent Privacy (WEP)

D.
Secure Post Office Protocol (POP)