This is a dedicated watch page for a single video.
Rashida, cloud security engineer, is implementing secure network configurations for a financial services application. To prevent Domain Name System (DNS) spoofing and ensure the integrity of DNS responses, which of the following should she MOST LIKELY configure?