You are designing a connectivity solution between on-premises infrastructure and Amazon VPC Your server’s on-premises will De communicating with your VPC instances You will De establishing IPSec tunnels over the internet You will be using VPN gateways and terminating the IPsec tunnels on AWS-supported customer gateways. Which of the following objectives would you achieve by implementing an IPSec tunnel as outlined above?

A. End-to-end protection of data in transit
B. End-to-end Identity authentication
C. Data encryption across the Internet
D. Protection of data in transit over the Internet
E. Peer identity authentication between VPN gateway and customer gateway
F. Data integrity protection across the Internet


Answer:
C. Data encryption across the Internet
D. Protection of data in transit over the Internet
E. Peer identity authentication between VPN gateway and customer gateway
F. Data integrity protection across the Internet

Computer Science & Information Technology

You might also like to view...

To ensure that a workbook cannot be edited, you must:

A) rename the workbook. B) click the Edit Anyway button. C) password protect the workbook. D) apply the Mark as Final status.

Computer Science & Information Technology

In later testing efforts, it is often beneficial to have ________ individuals placed into roles for which they may not be well suited

Fill in the blank(s) with correct word

Computer Science & Information Technology

All the following are file attributes EXCEPT

A) Reserved; Application B) Hidden; System C) Archive; Hidden D) Read Only, Archive

Computer Science & Information Technology

An incremental backup backs up only those files and folders that have changed since the previous backup and marks those files as having been backed up

Indicate whether the statement is true or false

Computer Science & Information Technology