To implement the security policies dictated for their sensitive data, your customer must ensure that
their data cannot be decrypted by someone who had left the company, but had administrator
access to their database. What is the most efficient way of implementing this policy with the
Advanced Security Option?
A.
After the employee leaves the company, change the table keys.
B.
After the employee leaves the company, change the master key.
C.
After the employee leaves the company, export the data and reload with a different set of
master and tablekeys.
D.
After the employee leaves the company, acquire an hardware security module (HSM).