A company has implemented the capability to send all log files to a central location by utilizing an encrypted channel. The log files are sent to this location in order to be reviewed. A recent exploit has caused the company's encryption to become unsecure. Which of the following would be required to resolve the exploit?
A. Utilize a FTP service
B. Install recommended updates
C. Send all log files through SMTP
D. Configure the firewall to block port 22
Answer: B. Install recommended updates
You might also like to view...
To customize a VSTO template by adding interactive objects, the ____ view of Visual Studio is used.
A. Debug B. Interactive C. Build D. Design
Users with broadband connections are typically equipped with a(n) ________ that connects their home's network to the Internet.
A. webcast B. residential gateway C. hotspot D. MOOC
If you create a report using the ____ button on the CREATE tab, Access automatically creates a tabular layout.
A. Report B. Report Wizard C. Report Design D. Blank Report
A router directs messages based on the destinations’
a. Layer 1 address b. Layer 2 address c. Layer 3 address d. Layer 4 address