98-367 Exam Question 116
Which of the following is a security protocol that is used to protect data from being modified, corrupted, or accessed without authorization?
98-367 Exam Question 117
The company that you work for wants to set up a secure network, but they do not have any servers.
Which three security methods require the use of a server? (Choose three.)
Which three security methods require the use of a server? (Choose three.)
98-367 Exam Question 118
A process by which DNS zone data is obtained by an attacker is referred to as:
98-367 Exam Question 119
Which three elements does HTTPS encrypt? (Choose three.)
98-367 Exam Question 120
Account lockout policies are used to prevent which type of security attack?