07. Using Encryption for User Tables

Using Encryption for User Tables

Using Encryption to Secure User Tables

ND004 C03 L03 A04.3 Encryption V2

Risks of Password Encryption

Which of the following statements are true:
(Select all that apply.)

SOLUTION:
  • Data compromised from a database would also require a compromised key to read
  • Encryption keys should only be given to key people and key systems