A team of firewall administrators have access to a `master password list’ containing service account
passwords. Which of the following BEST protects the master password list?
Full disk encryption
File encryption can be used to protect the contents of individual files. It uses randomly generated symmetric
encryption keys for the file and stores the key in an encrypted form using the user’s public key on the encrypted