After activating disk encryption on an existing IBM TS7700, which action does a client need to take for the existing virtual volumes to be encrypted?
A . Any existing volumes will have to expire and be reused before being encrypted.
B . No additional customer action is required once encryption is enabled
C . The customer must assign existing virtual volumes with a new encryption policy
D . The copy refresh command must be issued for each of the existing volumes
Answer: C
Explanation:
An encryption policy configuration is the set of rules, or policies, that specify which volumes are to be
encrypted.
References: https://www-01.ibm.com/support/docview.wss?uid=ssg1S7005315&aid=1
IBM TS7700 Version 4 Release 1, Introduction and Planning Guide, page 123
Leave a Reply