You are configuring a company executive's laptop, which will hold highly confidential project documentation. To align with corporate security guidelines, which method should you use to ensure the confidentiality of the data if the laptop is misplaced or stolen?
Set a BIOS/UEFI password in conjunction with a secure boot-up process.
Enable BitLocker Drive Encryption leveraging the onboard TPM security hardware.
Use software-based encryption to create an encrypted container for personal files.
Implement folder-specific encryption to isolate and protect individual directories.