CompTIA Security+ SY0-701 Practice Question
When a company needs to guard its intellectual property during transmission over a public network, which method should be employed to best secure the data, assure its integrity, and authenticate the communicators?
Employing an encrypted tunneling protocol for securing all company data transmissions
Digitally signing all documents before sharing via the company's standard email service
Utilizing an encrypted file transfer service for all outbound company communications
Enforcing the use of encrypted email services for sharing any sensitive documents