List of questions
Related questions
Question 64 - 300-910 discussion
An application for storing and categorizing has been developed. The application uses dual-factor authentication for user access. After authentication, users can upload sensitive dat a. The application has been hacked through system exploits and most of the saved data has been lost.
Which action prevents new security threats in the environment?
A.
Use self-developed algorithms for encryption
B.
Install virtual firewalls
C.
Actively change the ISP provider
D.
Apply all the latest patches and updates
Your answer:
0 comments
Sorted by
Leave a comment first