A security analyst is emailing PII in a spreadsheet file to an audit validator for after-actions related to a security assessment.
The analyst must make sure the PII data is protected with the following minimum requirements:
* Ensure confidentiality at rest.
* Ensure the integrity of the original email message.
Which of the following controls would ensure these data security requirements are carried out?
A . Encrypt and sign the email using S/MIM
C . Encrypt the email and send it using TL
E . Hash the email using SHA-1.
F . Sign the email using MD5
Answer: A