ABC.com is planning to implement encryption within their data center. The customer is considering
application-level encryption as a solution. They have asked you for guidance concerning the
extent of access provided by this level of encryption. From which system components are
application-encrypted data protected?
A.
Other applications, host, network, and storage device
B.
Storage network and storage device
C.
Host, network, and storage device
D.
Other applications, network, and storage device