Watch this video on YouTube
Which of the following data labeling techniques is most suitable for preventing unauthorized access to sensitive information during data transmission?