A company wants to ensure the authenticity, confidentiality, and integrity of its secure communications across its network. What is the BEST method to achieve this?
Implementing a Public Key Infrastructure (PKI) system
Enabling firewall rules for incoming and outgoing traffic
Applying strict access control lists (ACLs)
Increasing the complexity of network passwords