Which data-protection method provides an effective deterrent to illicit network access via networkconnected machines, especially if these machines are linked as part of a VPN?
A.
File encryption
B.
Full disk encryption
C.
User authentication
D.
Boot protection
Explanation: