Chapter 7 – Securing Data and Applications Question 1