In highly secure environments where the risk of malicious actors attempting to steal data is high, which of the following is the BEST reason to deploy Faraday cages?
A . To provide emanation control to prevent credential harvesting
B . To minimize signal attenuation over distances to maximize signal strength
C . To minimize external RF interference with embedded processors
D . To protect the integrity of audit logs from malicious alteration
Answer: C