Which of the following can be used to ensure that sensitive records stored on a backend server can only be
accessed by a front end server with the appropriate record key?
A.
File encryption
B.
Storage encryption
C.
Database encryption
D.
Full disk encryption