ISC Exam Questions

Which of the following methods protects Personally Identifiable Information (PII) by use of a full r

Which of the following methods protects Personally Identifiable Information (PII) by use of a full
replacement of the data element?

A.
Transparent Database Encryption (TDE)

B.
Column level database encryption

C.
Volume encryption

D.
Data tokenization