A bank insists all of its vendors must prevent data loss on stolen laptops. Which of the following strategies is the bank requiring?
A. Encryption at rest
B. Masking
C. Data classification
D. Permission restrictions
A. Encryption at rest
B. Masking
C. Data classification
D. Permission restrictions