Ultimate access to all questions.
A company seeks to ensure complete encryption of traffic between external users and their application, which is hosted on a fleet of Amazon EC2 instances managed by an Auto Scaling group and situated behind an Application Load Balancer (ALB). What should a security engineer do to achieve this level of encryption?