A security administrator is addressing an issue with a legacy system that communicates data using an unencrypted protocol to transfer sensitive data to a third party. No software updates that use an encrypted protocol are available, so a compensating control is needed. Which of the following are the most appropriate for the administrator to suggest? (Choose two.)
beebax
3 days, 10 hours agoEracle
21 hours, 10 minutes agoPhatcharaphon
2 weeks, 3 days agoExam_Prep221
3 weeks, 2 days ago