Which of the following, if implemented, would improve security of remote users by reducing
vulnerabilities associated with data-in-transit?

A.
Full-disk encryption
B.
A virtual private network
C.
A thin-client approach
D.
Remote wipe capability