Which of the following accurately describes why a file on a USB drive would be inaccessible by a user until the correct authentication is received?