which of the following should a technican consider when selecting an encryption method for data that needs to remain confidential for a specific lenght of ime