Watch this video on YouTube
Which of the following is the MOST effective method for protecting the confidentiality of data in a file-level encryption system?