you're deploying a new linux server. it will run a sensitive process which, according to policy requirements, must operate in a secure encrypted enclave so that even a compromised driver or kernel can't view or interfere with it. what security step will most directly accomplish this goal? choose the best response.