Which of the following methods protects Personally Identifiable Information (PII) by use of a full
replacement of the data element?
A.
Transparent Database Encryption (TDE)
B.
Column level database encryption
C.
Volume encryption
D.
Data tokenization