What is the easiest solution for a company to implement in order to defend data from being
compromised if a physical hard disk is stolen?

A.
a strong password policy for data shares
B.
TPM (Trusted Platform Module) in conjunction with encryption software
C.
Integrated Encryption System, enabled on disk arrays located in data centers
D.
RAID 6 volumes used to protect againstolent data