A. Encryption of application data
B. Authentication of application users
C. Protection of physical network infrastructure
D. Configuration of firewalls

- Awsexamhub website is not related to, affiliated with, endorsed or authorized by Amazon.
- Trademarks, certification & product names are used for reference only and belong to Amazon.