To implement the security policies dictated for their sensitive data, your customer must ensure that
their data cannot be decrypted by someone who had left the company, but had administrator access
to their database. What is the most efficient way of implementing this policy with the Advanced
Security Option?
A.
After the employee leaves the company, change the table keys.
B.
After the employee leaves the company, change the master key.
C.
After the employee leaves the company, export the data and reload with a different set of master
and table keys.
D.
After the employee leaves the company, acquire an hardware security module (HSM).