jusbro2686 jusbro2686 11-08-2024 Computers and Technology Answered Which of the following is a common method for protecting sensitive information from unauthorized access?A) Password hashingB) DefragmentationC) Data compressionD) Disk cleanup