You need to prevent unauthorized users from reading a specific file on a portable computer if the portable computer is stolen.
What should you implement?
A. File-level permissions
B. Advanced Encryption Standard (AES)
C. Folder-level permissions
D. Distributed File System (DFS)
E. BitLocker