Watch this video on YouTube
When fortifying the security of data at rest within a cloud environment, which of the following options would be considered the least effective method for safeguarding such data?