Which of the following should be applied in order to achieve confidentiality and integrity of all data across the link?
Which of the following activities should be performed by the IT security staff member prior to establishing the link?