Certified Ethical Hacker – CEH – 312-50 – Question323

Which of the following is considered the best way to protect Personally Identifiable Information (PII) from Web application vulnerabilities?


A.
Use cryptographic storage to store all PII
B. Use encrypted communications protocols to transmit PII
C. Use full disk encryption on all hard drives to protect PII
D. Use a security token to log into all Web applications that use PII

Correct Answer: A

Explanation:

As a matter of good practice any PII should be protected with strong encryption.
References: https://cuit.columbia.edu/cuit/it-security-practices/handling-personally-identifying-information