A financial services company is developing a shared data service that supports different applications from throughout the company. A Database Specialist designed a solution to leverage Amazon ElastiCache for Redis with cluster mode enabled to enhance performance and scalability. The cluster is configured to listen on port 6379.
Which combination of steps should the Database Specialist take to secure the cache data and protect it from unauthorized access? (Choose three.)
Pranava_GCP
1 year, 8 months agomraronsimon
1 year, 11 months agoken_test1234
2 years, 2 months agoSteveMartin9
2 years, 4 months agoSachinGoel
2 years, 4 months agosju
2 years, 5 months agoSab
2 years, 6 months agonovice_expert
3 years, 1 month agosoyyodario
3 years, 4 months ago2025flakyt
3 years, 6 months ago2025flakyt
3 years, 6 months agojove
3 years, 5 months ago2025flakyt
3 years, 6 months agocynthiacy
3 years, 6 months ago