Which of the following encryption methods is being described when a secure encrypted tunnel is
created between a host and a storage device, but the data stored on disk is not encrypted?
A.
Data At-Rest Encryption
B.
Host Encryption
C.
Network Encryption
D.
Data In-Flight Encryption