Access mechanisms to data on encrypted USB hard drives must be implemented correctly
otherwise:
A.
user accounts may be inadvertently locked out.
B.
data on the USB drive could be corrupted.
C.
data on the hard drive will be vulnerable to log analysis.
D.
the security controls on the USB drive can be bypassed.