A. Use cryptographic storage to store all PII
B. Use encrypted communications protocols to transmit PII
C. Use full disk encryption on all hard drives to protect PII
D. Use a security token to log into all Web applications that use PII
Scroll down for answer
The following books are highly recommended to progress your CEH v10 studies.
As a matter of good practice any PII should be protected with strong encryption.
Also see: Top Tips to Increase Your Online Privacy
CEH v10 EC Council questions and answers.
FREE PDF Download of all CEH v10 exam questions and answers.