Question 76

Two users need to securely share encrypted files via email. Company policy prohibits users from sharing credentials or exchanging encryption keys. Which of the following can be implemented to enable users to share encrypted data while abiding by company policies?
  • Question 77

    During a recent audit, it was discovered that several user accounts belonging to former employees were still active and had valid VPN permissions.
    Which of the following would help reduce the amount of risk the organization incurs in this situation in the future?
  • Question 78

    A company wants to host a publicly available server that performs the following functions:
    * Evaluates MX record lookup
    * Can perform authenticated requests for A and AAA records Uses RRSIG
    * Which of the following should the company use to fulfill the above requirements?
    Which of the following should the company use to fulfill the above requirements?
  • Question 79

    A technician, who is managing a secure B2B connection, noticed the connection broke last night. All networking equipment and media are functioning as expected, which leads the technician to Question: following should the technician use to validate this assumption? (Choose two.)
  • Question 80

    A forensic analyst is asked to respond to an ongoing network attack on a server. Place the items in the list below in the correct order in which the forensic analyst should preserve them.