10.4.9

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

An accountant needs to send an email with sensitive information to a client and wants to prevent someone from reading the email if it is intercepted in transit. The client's email system does not allow them to receive attachments due to their company security policies. Which of the following should the accountant use to send the email?

Cipher text

The CEO of a small business travels extensively and is worried about having the information on their laptop stolen if the laptop is lost or stolen. Which of the following would BEST protect the data from being compromised if the laptop is lost or stolen?

Full disk encryption

Which Internet protocol is used to transmit encrypted data?

HTTPS

A technician is tasked to configure a mobile device to connect securely to the company network when the device is used at offsite locations where only internet connectivity is available. Which of the following should the technician configure?

VPN

Gloria is concerned that her online banking transactions could be intercepted if she uses public WiFi. Which of the following could she use to prevent access to her online transactions?

VPN

A small business wants to make sure their wireless network is using the strongest encryption to prevent unauthorized access. Which of the following wireless encryption standards should be used?

WPA2

While configuring a wireless access point device, a technician is presented with several security mode options. Which of the following options will provide the most secure access?

WPA2 and AES

A user has opened a web browser and accessed a website where they are creating an account. The registration page is asking the user for their username (email address) and a password. The user looks at the URL and the protocol being used is HTTP. Which of the following describes how the data will be transmitted from the webpage to the webserver?

Plain text

A technician is tasked to add a valid certificate to a mobile device so that encrypted emails can be opened. Which of the following email protocols is being used?

S/MIME

Which of the following protocols can be enabled so email is encrypted on a mobile device?

SSL


Set pelajaran terkait

Lesson One: OSI anD TCP/IP Modle

View Set

Traditional Hawaiian Metaphors Worksheet

View Set

Chapter 9-Activity based costing

View Set