Encrypted file transfers between systems provide better data integrity and confidentiality than “in
the clear” transfers. What two areas need to be considered prior to implementing such a solution?
Select two.
A.
only private lines may be used to connect sender and receiver
B.
system performance impact of encrypted transfers
C.
sender and receiver always have to run the same operating system
D.
unavailability of encrypted network transfer utilities
E.
security issues associated with key distribution and management