CheckPoint Exam Questions

Which of the following strategies, if used individually, is viewed to be the most secure method to p

Which of the following strategies, if used individually, is viewed to be the most secure method to protect data?

A.
File encryption

B.
Boot protection

C.
Encryption

D.
Boot protection and encryption