Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Please solve both Questions carefully.. Thanks 50- multiple end users have repor

ID: 3906863 • Letter: P

Question

Please solve both Questions carefully.. Thanks

50- multiple end users have reported a deluge of unsolicited email messages they are receiving on a daily basis. Which of the following technologies could stem the flow of those messages while ensuring valid messages to still reach their destination? A) Stateful firewall B) Spam filter C) Access control list D) URL content filter 51- A Security technician is reviewing a new vendor's practices for a project, but the vendors only supply SLA you documentation. Which of the following should the security technician request to understand the vendor's adherence own policies? A) Controls data audits B) Entry log audits C) Access log audits D) Security log audits

Explanation / Answer

Answer 50:

Use spam filter to detecft unwanted emails and prevent those email coming into your inbox

Answer 51:

Control data audits where we can find the his polices