When implementing disk encryption on an existing IBM TS7700, which action does a client need to take for the existing virtual volumes to be encrypted after the encryption feature is enabled?
A . The customer must assign existing virtual volumes with a new encryption policy.
B . No additional customer action is required once encryption is enabled.
C . The copy refresh command must be issued for each of the existing volumes.
D . Any existing volumes will have to expire and be reused before being encrypted
Answer: A
Explanation:
An encryption policy configuration is the set of rules, or policies, that specify which volumes are to be
encrypted.
References: https://www-01.ibm.com/support/docview.wss?uid=ssg1S7005315&aid=1
IBM TS7700 Version 4 Release 1, Introduction and Planning Guide, page 123
Latest C1000-022 Dumps Valid Version with 302 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund