Encryption is usually fully transparent to the PC user.
Indicate whether the statement is true or false.
Question 2
________ is an example of PII.
A) Individual database names
B) Social Security number
C) Process run to backup servers
D) None of the above