When implementing disk encryption on an existing IBM TS7700, which action does a client need to take for the existing virtual volumes to be encrypted after the encryption feature is enabled?

When implementing disk encryption on an existing IBM TS7700, which action does a client need to take for the existing virtual volumes to be encrypted after the encryption feature is enabled?
A . The customer must assign existing virtual volumes with a new encryption policy.
B . No additional customer action is required once encryption is enabled.
C . The copy refresh command must be issued for each of the existing volumes.
D . Any existing volumes will have to expire and be reused before being encrypted

Answer: A

Explanation:

An encryption policy configuration is the set of rules, or policies, that specify which volumes are to be

encrypted.

References: https://www-01.ibm.com/support/docview.wss?uid=ssg1S7005315&aid=1

IBM TS7700 Version 4 Release 1, Introduction and Planning Guide, page 123

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments