This is a dedicated watch page for a single video.
A security team has requested that all existing and new Amazon RDS databases are encrypted at rest using AWS Key Management Service (KMS) encryption keys. A security engineer must identify which RDS databases are currently unencrypted and devise a plan for enabling encryption. Which combination of steps should the security engineer take to accomplish this? (Select TWO.)