A company that must comply with regulations is searching for a laptop encryption product to use for its 40,000
end points. The product must meet regulations but also be flexible enough to minimize overhead and support in
regards to password resets and lockouts. Which of the following implementations would BEST meet theneeds?
A.
A partition-based software encryption product with a low-level boot protection and authentication
B.
A container-based encryption product that allows the end users to select which files to encrypt
C.
A full-disk hardware-based encryption product with a low-level boot protection and authentication
D.
A file-based encryption product using profiles to target areas on the file system to encrypt