After copying a sensitive document from his desktop to a flash drive, John, a user, realizes that the document is no longer encrypted. Which of the following can a security technician implement to ensure that documents stored on John’s desktop remain encrypted when moved to external media or other network based storage?
A. Whole disk encryption
B. Removable disk encryption
C. Database record level encryption
D. File level encryption