A company has implemented the capability to send all log files to a central location by utilizing an encrypted channel. The log files are sent to this location in order to be reviewed. A recent exploit has caused the company's encryption to become unsecure. Which of the following would be required to resolve the exploit?

A. Utilize a FTP service
B. Install recommended updates
C. Send all log files through SMTP
D. Configure the firewall to block port 22


Answer: B. Install recommended updates

Computer Science & Information Technology

You might also like to view...

To customize a VSTO template by adding interactive objects, the ____ view of Visual Studio is used.

A. Debug B. Interactive C. Build D. Design

Computer Science & Information Technology

Users with broadband connections are typically equipped with a(n) ________ that connects their home's network to the Internet.

A. webcast B. residential gateway C. hotspot D. MOOC

Computer Science & Information Technology

If you create a report using the ____ button on the CREATE tab, Access automatically creates a tabular layout.

A. Report B. Report Wizard C. Report Design D. Blank Report

Computer Science & Information Technology

A router directs messages based on the destinations’

a. Layer 1 address b. Layer 2 address c. Layer 3 address d. Layer 4 address

Computer Science & Information Technology