mvongphakdy3329 mvongphakdy3329 30-11-2022 Computers and Technology contestada Data exists in several states, each requiring different security considerations. Evaluate the following items and select which data state presents the greatest encryption challenge. Data in use Data in transit Data in motion Data at rest