Which of the following methods protects Personally Identifiable Information (PII) by use of a full replacement of the data element?
A. Data tokenization
B. Volume encryption
C. Transparent Data Encryption (TDE)
D. Column level database encryption
A. Data tokenization
B. Volume encryption
C. Transparent Data Encryption (TDE)
D. Column level database encryption