An administrator wants to ensure hard drives cannot be removed from hosts and men installed into and read by unauthorized hosts.
Which of the following techniques would BEST support this?
A . Access control lists
B . TACACS+ server for AAA
C . File-level encryption
D . TPM with sealed storage
Answer: A
Latest CAS-003 Dumps Valid Version with 509 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund