Which two secure communication protocols should you use?
What should you do?
Which strategy should you recommend?
Which storage mechanism should you use?