Which of the following will help to protect an organization from further data exposure AFTER a list of user passwords has already been leaked due to policy breach? .A. Use multi-factor authenticationB. Require strong passwordsC. Enable file encryptionD. Educate end usersE. Restrict user permissions