A Development team is designing an application that processes sensitive information within a hybrid deployment. The team needs to ensure the application data is protected both in transit and at rest.
Which combination of actions should be taken to accomplish this? (Choose two.)
kiev
Highly Voted 2 years, 6 months agoAWS_Noob
Highly Voted 2 years, 7 months agokung07
2 years, 7 months agoPhil31
2 years, 7 months agojaribu
2 years, 7 months agoalbert_kuo
Most Recent 9 months, 3 weeks agoaidenpearce01
2 years, 1 month agoPradhan
2 years, 6 months agoTroyMcLure
2 years, 6 months agoRicardoD
2 years, 6 months agohdbs
2 years, 6 months agohdbs
2 years, 6 months agoabhishek_m_86
2 years, 6 months agojackdryan
2 years, 6 months agoMario799
2 years, 6 months agoMFDOOM
2 years, 6 months agoThabo_Ramoshai
2 years, 6 months agovnsuk
2 years, 6 months agowaterzhong
2 years, 6 months agoPirulou
2 years, 6 months ago