A corporation requires a method to ensure that its staff can connect to internal resources from outside the office environment with assured confidentiality and integrity of data. Which solution would BEST meet this requirement while providing encrypted channels for remote endpoint connectivity?
You selected this option
Configuring encrypted gateways at the network perimeter for enhanced security.
You selected this option
Enforcing perimeter security controls that prevent unauthorized network entry.
You selected this option
Utilizing end-to-end encrypted tunneling services with access control.
You selected this option
Setting up remote access servers that allow direct connections from the internet.
A solution that creates an encrypted tunnel to the corporate network is essential for secure remote access. The most appropriate technology for establishing such secure connections is a solution that encapsulates and encrypts data as it travels over possibly insecure networks, like the internet, requiring proper authentication from the connecting users to access internal network resources. Implementing remote access servers without additional encryption would not ensure data confidentiality and integrity. Configuring encrypted gateways focuses solely on securing gateways but does not address endpoint-to-network secure connectivity. Secure network perimeters enhance the overall network security but do not inherently provide secure remote access capabilities.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are end-to-end encrypted tunneling services?
Open an interactive chat with Bash
What role does access control play in remote connectivity?
Open an interactive chat with Bash
What are some common tunneling protocols used for secure remote access?