Which data protection method provides an effective deterrent to illicit network access via networkconnected machines, especially if these machines are linked as part of a VPN?
A.
Boot protection
B.
User authentication
C.
Full disk encryption
D.
File encryption
Explanation: