A company has implemented the capability to send all log files to a central location by utilizing an encrypted channel. The log files are sent to this location in order to be reviewed. A recent exploit has caused the company's encryption to become unsecure. Which o f the following would be required to resolve the exploit?

A. Utilize a FTP service
B. Install recommended updates
C. Send all log files through SMTP
D. Configure the firewall to block port 22


Answer: B. Install recommended updates

Computer Science & Information Technology

You might also like to view...

What is meant by the term high availability related to information technology systems?

a. It refers to information technology systems that are in continuous operation for a long time, with minimal downtime. b. It refers to information technology systems that are in operation for a long time, with some downtime. c. It refers to information technology systems that are inexpensive

Computer Science & Information Technology

Write the code for a loop that starts at 0 and iterates seven times.

What will be an ideal response?

Computer Science & Information Technology

The statement dataType[][][] arrayName; would declare a two-dimensional array.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The infix expression(a + b) * (c - d / e) + fis equivalent to the postfix expressionab + cde /-* f +

Answer the following statement true (T) or false (F)

Computer Science & Information Technology