Heather steals a work laptop belonging to Fay, who works for the Central Intelligence Agency (CIA). Heather discovers it’s easy to guess Fay’s password, but when Heather tries to access any of the files on the laptop, she discovers that she can’t get at them without the requested key. What is MOST likely to have automatically happened to these files?

(1 point)
Responses

They were corrupted.

They were corrupted.

They were encrypted.

They were encrypted.

They were erased.

They were erased.

They were authorized.

They were authorized.

They were encrypted.