A recent risk assessment revealed that users transferred data to and from unauthorized sites through terminal services. The security team needs to implement technical controls that allow specific employees to connect remotely and securely throughout the network. Which of the following data security techniques should the team use? (Choose two.)
Bright07
3 months ago