An architect is reviewing the information provided by a customer for a new vSphere solution design. The customer has stated that some of the virtual machines (VMs) that will be hosted on the new solution handle credit card information from their users as part of an online payment application, and that some of the information will need to be stored temporarily to allow transactions to be completed. Therefore, the solution must be designed to be able to mask or hash the stored information as they will need to show compliance against common industry standards that contain references to the requirements for handling sensitive information.
Which design quality is being requested by the customer?
Kywik
1 week, 3 days agowildcatwonder2025
1 week, 4 days ago