cardholder data at rest only in certain fields in the database schema. The requirement is to substitute a
sensitive data field with a non-sensitive field that is rendered useless if a data breach occurs. Which of the
following is the BEST solution to meet the requirement?
A. Tokenization
B. Masking
C. Full disk encryption
D. Mirroring