In a security assessment, a company is testing the effectiveness of its encryption controls for data in transit. The security team wants to ensure that data remains confidential when transmitted between servers in different geographical locations. Which of the following testing methodologies would BEST validate the encryption controls in this scenario?
Options:
A. Protocol Analysis
B. Penetration Testing
C. Vulnerability Assessment
D. Security Configuration Testing