A security administrator is addressing an issue with a legacy system that communicates data using an unencrypted protocol to transfer sensitive data to a third party. No software updates that use an encrypted protocol are available, so a compensating control is needed. Which of the following are the most appropriate for the administrator to suggest? (Choose two.)
062c87f
6 days, 14 hours agojennyka76
3 months, 3 weeks agoAces155
5 months, 1 week agoAces155
5 months, 1 week agobeebax
5 months, 2 weeks agoEracle
5 months, 2 weeks agoPhatcharaphon
6 months ago