Which option is an accurate use case for Information Centric Encryption (ICE)?
A. The ICE utility encrypts files matching DLP policy being copied from network share through use of encryption keys.
B. The ICE utility encrypts files matching DLP policy being copied to removable storage through use of encryption keys.
C. The ICE utility encrypts files matching DLP policy being copied to removable storage on an endpoint use of certificates.
D. The ICE utility encrypts files matching DLP policy being copied from network share through use of certificates