Which of the following will help to protect an organization from further data exposure AFTER a list of user passwords has already been leaked due to policy breach? (Select TWO).
A . Use multi-factor authentication
B . Require strong passwords
C . Enable file encryption
D . Educate end users
E . Restrict user permissions
Answer: AD