A system administrator has been instructed by the head of security to protect their data at-rest.
Which of the following would provide the strongest protection?

A.
Prohibiting removable media
B.
Incorporating a full-disk encryption system
C.
Biometric controls on data center entry points
D.
A host-based intrusion detection system
Explanation:
Full disk encryption can be used to encrypt an entire volume with 128-bit encryption. When the
entire volume is encrypted, the data is not accessible to someone who might boot another
operating system in an attempt to bypass the computer’s security. Full disk encryption is
sometimes referred to as hard drive encryption. This would be best to protect data that is at rest.