A company that must comply with regulations is searching for a laptop encryption product to use for its 40,000 end points. The product must meet regulations but
also be flexible enough to minimize overhead and support in regards to password resets and lockouts. Which of the following implementations would BEST meet
the needs?
A.
A partition-based software encryption product with a low-level boot protection and authentication
B.
A container-based encryption product that allows the end users to select which files to encrypt
C.
A full-disk hardware-based encryption product with a low-level boot protection and authentication
D.
A file-based encryption product using profiles to target areas on the file system to encrypt