A system administrator has been instructed by the head of security to protect their data at-rest.
Which of the following would provide the strongest protection?
Prohibiting removable media
Incorporating a full-disk encryption system
Biometric controls on data center entry points
A host-based intrusion detection system
Full disk encryption can be used to encrypt an entire volume with 128-bit encryption. When the entire volume is
encrypted, the data is not accessible to someone who might boot another operating system in an attempt to
bypass the computer’s security. Full disk encryption is sometimes referred to as hard drive encryption. This
would be best to protect data that is at rest.