Ann would like to forward some Personal Identifiable Information to her HR department by email, but she is
worried about the confidentiality of the information. Which of the following will accomplish this task securely?

A.
Digital Signatures
B.
Hashing
C.
Secret Key
D.
Encryption
Explanation:
Encryption is used to prevent unauthorized users from accessing data. Data encryption will support the
confidentiality of the email.