Review Case
Refer to Case 3.
You are designing a transformation from Platform 2.0 to cloud. You review the existing infrastructure and business requirements. You must define the method to encrypt data that is being transmitted across the network and stored in the public cloud.
Which technology should you select?
A . MPLS
B . KMS
C . IPSec VPN
D . IDPS
Answer: B
Explanation:
MPLS NO es multiprotocol label switching
KMS Note: encryption should be used for protecting data that is being transmitted across the network and stored in the public cloud. This addresses the requirements for privacy, regulatory compliance, and loss of control of media. An example is AWS Key Management Service (KMS).
IPSEC vpn NO This IPsec VPN is one of the most common scenarios for extending an organization’s on-premises network into their public cloud deployed network. The VPN gateway deployed in the on-premises network could be a physical or virtual
IDPS no Intrusion Detection Prevention System (IDPS):