When a company needs to guard its intellectual property during transmission over a public network, which method should be employed to best secure the data, assure its integrity, and authenticate the communicators?
Employing an encrypted tunneling protocol for securing all company data transmissions
Digitally signing all documents before sharing via the company's standard email service
Utilizing an encrypted file transfer service for all outbound company communications
Enforcing the use of encrypted email services for sharing any sensitive documents
Employing an encrypted tunneling protocol is the best option for securing data sent across a public network because it encloses the data in an encrypted 'tunnel,' ensuring confidentiality and integrity while also providing a means of authenticating the parties involved. Only authorized users can access the tunnel, preventing unauthorized interception or alteration of data. Encrypted email services provide security for email message contents but are not comprehensive for all company data in transit. An encrypted file transfer would secure individual file transfers but lacks the full communication authentication features of a tunneling protocol. Meanwhile, solely digitally signing the documents secures authenticity and integrity, but does not encrypt the actual data contents, leaving them vulnerable if intercepted during transmission.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are encrypted tunneling protocols, and how do they work?
Open an interactive chat with Bash
Why is it important to use encryption when transmitting data over a public network?
Open an interactive chat with Bash
What are some examples of encrypted tunneling protocols available for companies?