sadairwin788 sadairwin788 30-11-2022 Computers and Technology contestada in a security review meeting, you are asked to appropriately handle the enterprise's sensitive data. how should you configure the security of the data?