A company must send sensitive data over a non-secure network via web services. The company suspects that competitors are actively trying to intercept all transmissions. Some of the information may be valuable to competitors, even years after it has been sent. Which of the following will help mitigate the risk in the scenario?A. Digitally sign the data before transmissionB. Choose steam ciphers over block ciphersC. Use algorithms that allow for PFSD. Enable TLS instead of SSLE. Use a third party for key escrow