A user is buying a laptop. The user will have a lot of personal and confidential information on the laptop. The user wants to ensure data cannot be accessed by anyone, even if the laptop is stolen.
Which of the following should be set up to accomplish this?
A . Encryption
B . Compression
C . Permissions
D . Auditing
Answer: A