A customer has two EMC Data Domain systems. They plan to perform replication seeding before moving the
replication target to a secured site by a third-party. The customer wants to protect the system from
unauthorized data access.
What must be done to ensure the system is protected from unauthorized access or accidental exposure?

A.
Enable encryption and lock the file system
B.
Ensure system sanitization is performed before transport
C.
Enable local compression and archive the data
D.
Ensure system administrator credentials are updated with a strong password