Which of the following strategies, if used individually, is viewed to be the most secure method to protect data?
A.
File encryption
B.
Boot protection
C.
Encryption
D.
Boot protection and encryption
Which of the following strategies, if used individually, is viewed to be the most secure method to protect data?
Which of the following strategies, if used individually, is viewed to be the most secure method to protect data?
A.
File encryption
B.
Boot protection
C.
Encryption
D.
Boot protection and encryption