Correct option is (b) Locking
The explanation is: For data protection, End Point Protection approach favour locking data into the device through full disk encryption port control, auditing and restriction of data prior to release from the device and other similar mechanisms.