Multiple Choice
Which two strategies are used to protect personally identifiable information? (Choose two.)
A) Encrypt data in transit.
B) Encrypt hash values of data.
C) Encrypt data at rest.
D) Only hash usernames and passwords for efficient lookup.
E) Only encrypt usernames and passwords for efficient lookup.
Correct Answer:

Verified
Correct Answer:
Verified
Q79: An automated solution is needed to configure
Q80: <img src="https://d2lvgg3v3hfg70.cloudfront.net/C1178/.jpg" alt=" Refer to the
Q81: <img src="https://d2lvgg3v3hfg70.cloudfront.net/C1178/.jpg" alt=" Refer to the
Q82: A developer plans to create a new
Q83: What is a benefit of continuous testing?<br>A)
Q85: <img src="https://d2lvgg3v3hfg70.cloudfront.net/C1178/.jpg" alt=" Refer to the
Q86: In the three-legged OAuth2 authorization workflow, which
Q87: <img src="https://d2lvgg3v3hfg70.cloudfront.net/C1178/.jpg" alt=" Refer to the
Q88: Which transport protocol is used by gNMI?<br>A)
Q89: <img src="https://d2lvgg3v3hfg70.cloudfront.net/C1178/.jpg" alt=" Refer to the