An engineer must configure an IPsec tunnel to the cloud VPN gateway. Which Two actions send traffic into the tunnel? (Choose two.)
According to the FedRAMP Authorization Boundary Guidance document1, the method used to create authorization boundary diagrams (ABDs) is to identify all tools as either external or internal to the boundary. The ABD is a visual representation of the components that make up the authorization boundary, which includes all technologies, external and internal services, and leveraged systems and accounts for all federal information, data, and metadata that a Cloud Service Offering (CSO) is responsible for.The ABD should illustrate a CSP's scope of control over the system and show components or services that are leveraged from external services or controlled by the customer1.The other options are incorrect because they do not capture the full scope and details of the authorization boundary as required by FedRAMP.Reference:= FedRAMP Authorization Boundary Guidance document1
Limited Time Offer
25%
Off
Janessa
Irma
1 days agoNana
2 days agoHermila
22 days agoLai
6 days agoPatti
9 days agoDesirae
11 days agoMarsha
23 days agoLashandra
25 days agoRex
27 days agoFannie
28 days agoFrancene
1 months agoLigia
1 months ago