After recovering from a data breach in which customer data was lost, the legal team meets with the Chief
Security Officer (CSO) to discuss ways to better protect the privacy of customer data.
Which of the following controls support this goal?
Encryption and stronger access control
Hashing and non-repudiation
Redundancy and fault tolerance
Encryption is used to protect data/contents/documents. Access control refers to controlling who accesses any
data/contents/documents and to exercise authorized control to the accessing of that data.