After activating disk encryption on an existing IBM TS7700, which action does a client need to take for the existing virtual volumes to be encrypted?

Posted by: Pdfprep Category: C1000-022 Tags: , ,

After activating disk encryption on an existing IBM TS7700, which action does a client need to take for the existing virtual volumes to be encrypted?
A . Any existing volumes will have to expire and be reused before being encrypted.
B . No additional customer action is required once encryption is enabled
C . The customer must assign existing virtual volumes with a new encryption policy
D . The copy refresh command must be issued for each of the existing volumes

Answer: C

Explanation:

An encryption policy configuration is the set of rules, or policies, that specify which volumes are to be

encrypted.

References: https://www-01.ibm.com/support/docview.wss?uid=ssg1S7005315&aid=1

IBM TS7700 Version 4 Release 1, Introduction and Planning Guide, page 123

Leave a Reply

Your email address will not be published.