Which of the following is the BEST method for ensuring all files and folders are encrypted on all corporate laptops where the file structures are unknown?
Which of the following types of data encryption would Matt, a security administrator, use to encrypt a specific table?