Rick hаs three mаjоr cаtegоries оf data and applications in use in his virtualization environment: highly sensitive, business sensitive, and unclassified (or public information). He wants to ensure that data and applications of different sensitivities are not compromised in the event of a breach. What migration technique is best suited to this type of requirement? C12