Using a protocol analyzer, a security consultant was able to capture employee’s credentials. Which of thefollowing should the consultant recommend to the company, in order to mitigate the risk of employees
credentials being captured in the same manner in the future?
Wiping of remnant data
Hashing and encryption of data in-use
Encryption of data in-transit
Hashing of data at-rest