Which technique is utilized to protect data during transmission over a network?
Encryption
Access control lists
Overlook minor misbehaviors
Impose harsh punishments for any infraction

Information Security Exercises are loading ...