Ultimate access to all questions.
Your company is transitioning to a cloud-based email service to enhance employee productivity and collaboration. As the Cybersecurity Architect, you are tasked with ensuring the security of email communications. The company operates in a highly regulated industry, requiring strict compliance with data protection standards. Additionally, the solution must be cost-effective and scalable to accommodate future growth. Considering these constraints, which of the following approaches BEST addresses the security requirements for the email service? (Choose one option)