Okay, I think I've got this. The key details are the encryption type (aes-256-ccm) and the key source (raw, file:///mykey). I'll go with options C and D to recreate the file system.
I'm leaning towards A and D. The Compliance Manager and Risk Manager seem like they would have the authority to create policies. Let's see if anyone else has a different take on this.
Eva
4 months agoMalcolm
4 months agoChun
4 months agoMollie
4 months agoLigia
5 months agoAnglea
5 months agoLizbeth
5 months agoKenny
5 months agoLatrice
5 months agoKathryn
5 months agoVesta
6 months agoRoosevelt
6 months agoChan
11 months agoRonald
9 months agoScarlet
9 months agoDaron
10 months agoJules
10 months agoEdna
11 months agoCortney
11 months agoJanae
11 months agoOdette
10 months agoLashawn
10 months agoLeonida
10 months agoAvery
11 months agoGail
10 months agoSamuel
10 months agoGeorgeanna
10 months agoLinwood
10 months agoCarolann
11 months agoAlton
11 months agoJesusa
11 months ago