Which security technology is most appropriate for protecting the confidentiality and integrity of data as it travels across an untrusted network such as the internet?
Web Application Firewall
Role-based access control
Secure Sockets Layer/Transport Layer Security
Network segmentation
Intrusion prevention system