PdfPrep.com

Given this scenario, which of the following security tools, services, and/or protocols would satisfy these requirements in the MOST secure manner?

A cloud administrator is securing data-at-rest and data-in-transit featured on an IaaS cloud platform. The volume to be secured is mounted storage from the same region and availability zone. The data is transferred via FTP to another Linux server in a secure manner in another availability zone, with the same data-at-rest requirements.

Given this scenario, which of the following security tools, services, and/or protocols would satisfy these requirements in the MOST secure manner? (Choose three.)
A . Ensure SSHv1 remote connection protocol is enabled.
B . Ensure SSHv2 remote connection protocol is enabled.
C . Ensure SSLv3 transport protocol is enabled.
D . Ensure TLSv1.2 transport protocol is enabled.
E . Ensure AES encryption is enabled.
F . Ensure 3DES encryption is enabled.
G . Ensure MD5 hashing is enabled.

Answer: B,D,E

Exit mobile version