A large e-commerce enterprise wants to send sensitive transactions from multiple retail sites to a public endpoint. They need confidentiality across the network and consistent performance under heavy transaction loads. Which approach best aligns with these goals?
Employ a simple proxy for data movement after transaction rates increase
Adopt a secure tunneling method that encrypts transmissions and maintains load capacity
Utilize an unencrypted direct link that routes sensitive traffic through various subnets
Establish a publicly accessible endpoint that uses ephemeral ports for sensitive data
A secure tunneling protocol that employs encryption, key management, and dedicated capacity provides confidentiality while maintaining stable throughput for large transfers. Approaches involving ephemeral ports or proxies without strong encryption do not consistently protect data during high-volume traffic. Unencrypted direct links may expose information in transit and lack reliable methods to handle spikes.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is a secure tunneling protocol?
Open an interactive chat with Bash
How does encryption ensure confidentiality in data transmission?
Open an interactive chat with Bash
Why is consistent performance important under heavy transaction loads?