A cloud administrator is securing data-at-rest and data-in-transit featured on an IaaS cloud platform. The volume to be secured is mounted storage from the same region and availability zone. The data is transferred via FTP to another Linux server in a secure manner in another availability zone, with the same data-at-rest requirements. Given this scenario, which of the following security tools, services, and/or protocols would satisfy these requirements in the MOST secure manner? (Choose three.)
A) Ensure SSHv1 remote connection protocol is enabled.
B) Ensure SSHv2 remote connection protocol is enabled.
C) Ensure SSLv3 transport protocol is enabled.
D) Ensure TLSv1.2 transport protocol is enabled.
E) Ensure AES encryption is enabled.
F) Ensure 3DES encryption is enabled.
G) Ensure MD5 hashing is enabled.
Correct Answer:
Verified
Q86: A technician receives a call from Joe,
Q87: A large law firm is migrating all
Q88: A customer has indicated that bi-weekly full
Q89: A company has hired a technician to
Q90: A company provides IaaS services. Which of
Q92: A VM was successfully tested in a
Q93: A facilities management company uses a private
Q94: The IT department receives a client request
Q95: A systems administrator created several new VMs
Q96: A private cloud is using the iSCSI
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents