A 1. Create a database encryption key.
2. Create or obtain a certificate protected by the encryption key.
3. Create a master key and protect it by the certificate.
4. Set the database to use encryption.
B 1. Create a database encryption key.
2. Create a master key.
3. Create or obtain a certificate protected by the master key.
4. Set the database to use encryption.
C 1. Create a master key.
2. Create or obtain a certificate protected by the master key.
3. Create a database encryption key and protect it by the certificate.
4. Set the database to use encryption.
D None of these