A software company uses a public cloud service for hosting development and deployment services. The company is evaluating options to protect against data breaches and compromised login credentials. What two countermeasures should be implemented? (Choose two.)
- Develop and implement compliance policies.
- Install host-based intrusion detection software on VMs in the cloud.
- Use an advanced encryption algorithm.
- Deploy development and deployment services across multiple zones.
- Perform a daily backup of data.
- Implement a multi-factor authentication process.
Explanation & Hint:
Using an advanced encryption algorithm to encrypt data in transition and in storage and implementing multi-factor authentication can protect against data breaches and compromised login credentials. |