Which of the following can be used to ensure that sensitive records stored on a backend server can only be accessed by a front end server with the appropriate record key?
A. File encryption
B. Storage encryption
C. Database encryption
D. Full disk encryption
Answer: A. File encryption
Computer Science & Information Technology