| Securing data at rest can be implemented by ______, and securing data in motion can be implemented by _______?
Please choose the correct option from below list
(1)RangerKMS, Wire Encryption
(2)Ranger, RangerKMS
(3)Ranger & RangerKMS, Wire Encryption
(4)Ranger, Wire Encryption
Answer:-(3)Ranger & RangerKMS, Wire Encryption | | |