An account you cover has received media attention. A disgruntled administrator had root access to a Linux x86 financial server, altered the boot process, and deactivated all of the security measures. The result was that highly sensitive data was stolen.
The account security directory would like to meet with you to determine if IBM Z has a solution that would prevent this from happening again.
Which IBM Z solution will prevent this type of breach?
A . Activate Integrated Cryptographic Service Facility (ICSF) along with the secure crypto coprocessor using AES keys.
B . Enable Pervasive Encryption to protect system data sets.
C . Implement the combination of RACF, z/VM, and zSecure products.
D . Use Secure Service Container to build, deploy, and manage a systems appliance.
Answer: B