Which of the following can be used to ensure that sensitive records stored on a backend server can only
be accessed by a front end server with the appropriate record key?

A.
File encryption
B.
Storage encryption
C.
Database encryption
D.
Full disk encryption