Which security technology is most appropriate for protecting the confidentiality and integrity of data as it travels across an untrusted network such as the internet?
Intrusion prevention system
Web Application Firewall
Secure Sockets Layer/Transport Layer Security
Role-based access control
Network segmentation