Which of the following actions should be taken when transmitting data to mitigate the chance of a data leak occurring? (Choose two.)
A. Data identification
B. Data processing
C. Data reporting
D. Data encryption
E. Data masking
F. Fata removal
A. Data identification
B. Data processing
C. Data reporting
D. Data encryption
E. Data masking
F. Fata removal