Which of the following encryption methods is being described when a secure encrypted tunnel is created between a host and a storage device, but the data stored on disk is not encrypted?
A. Data At-Rest Encryption
B. Host Encryption
C. Network Encryption
D. Data In-Flight Encryption