Which of the following data security techniques will allow Matt, an IT security technician, to encrypt
a system with speed as its primary consideration?

A.
Hard drive encryption
B.
Infrastructure as a service
C.
Software based encryption
D.
Data loss prevention