An organization operates multiple offices that frequently communicate sensitive information to the central office. Management wants to ensure that the transmitted data remains confidential and unaltered during transfer. What is the BEST implementation to achieve this goal?
Using context-aware network access solutions to determine connectivity
Implementing an encrypted communications channel between the offices
Strengthening endpoint authentication mechanisms at each office
Deploying traffic optimization appliances across the network
Implementing an encrypted communications channel is crucial for protecting the confidentiality and integrity of data being transferred between offices. This channel uses cryptographic protocols to secure the data against eavesdropping and tampering. While context-aware network access solutions provide a holistic security framework for access decisions, they focus more on user and device authentication rather than data transit security. Traffic optimization appliances help distribute network traffic efficiently but do not inherently provide encryption for data in transit. Endpoint authentication mechanisms are important for verifying device identities but do not protect data as it traverses the network.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are cryptographic protocols?
Open an interactive chat with Bash
How does encryption protect data during transmission?
Open an interactive chat with Bash
What is the role of integrity in data transmission?