Ann would like to forward some Personal Identifiable Information to her HR department by email,
but she is worried about the confidentiality of the information. Which of the following will
accomplish this task securely?

A.
Digital Signatures
B.
Hashing
C.
Secret Key
D.
Encryption
Explanation:
Encryption is used to prevent unauthorized users from accessing data. Data encryption will
support the confidentiality of the email.