AWS Exams GCP Exams Azure Exams GitHub Exams Jira Exams ISC2 Exams

Video: Data can be encrypted and then the encryption iscc video

Question 1
« Back   Next iscc Cloud ccsp Question »

Full Certification Question

Data can be encrypted and then the encryption keys can be destroyed as a method of data sanitation. This process is known as?