A storage administrator is auditing an environment and finds that an unknown person accessed
the company silo and removed a number of tapes. These tapes had sensitive company IP and PII
on them, now putting the company in a legally precarious situation. Which of the following could
the administrator do to ensure that lost data is not usable by an unauthorized person in the future?
A.
Password encryption
B.
Tape encryption
C.
Disk encryption
D.
Network encryption