98-367 Exam Question 116

Which of the following is a security protocol that is used to protect data from being modified, corrupted, or accessed without authorization?
  • 98-367 Exam Question 117

    The company that you work for wants to set up a secure network, but they do not have any servers.
    Which three security methods require the use of a server? (Choose three.)
  • 98-367 Exam Question 118

    A process by which DNS zone data is obtained by an attacker is referred to as:
  • 98-367 Exam Question 119

    Which three elements does HTTPS encrypt? (Choose three.)
  • 98-367 Exam Question 120

    Account lockout policies are used to prevent which type of security attack?