Which of the following is the MOST effective method of mitigating data theft from an active user
workstation?

A.
Implement full-disk encryption
B.
Enable multifactor authentication
C.
Deploy file integrity checkers
D.
Disable use of portable devices