Q1. Which one of the following is not a cryptographic method for securing data?
Q2. Which one of following is not a commonly used data state definition?
Q3. Drag appropriate statements to the box on the right-hand side that pertain to the data handling policy of sensitive information, such as PII.
Q4. Which one of the following policies is the least secure? Place a tick mark on the appropriate circle.