After copying a sensitive document from his desktop to a flash drive, Joe, a user, realizes that the
document is no longer encrypted. Which of the following can a security technician implement to
ensure that documents stored on Joe’s desktop remain encrypted when moved to external media
or other network based storage?
A.
Whole disk encryption
B.
Removable disk encryption
C.
Database record level encryption
D.
File level encryption
Explanation:
The answer is Removable Disk Encryption