CompTIA Study Materials
AWS Study Materials
AWS Certified Developer Associate AWS Certified Developer Associate
AWS Certified Developer Associate DVA-C02
AWS Certified Solutions Architect Associate AWS Certified Solutions Architect Associate
AWS Certified Solutions Architect Associate SAA-C03
AWS Cloud Practitioner AWS Cloud Practitioner
AWS Cloud Practitioner CLF-C02
Microsoft Study Materials
Microsoft Azure Fundamentals Microsoft Azure Fundamentals
Microsoft Azure Fundamentals AZ-900

Free CompTIA Network+ N10-008 Practice Question

A company has recently adopted a policy requiring all sensitive data to be encrypted both at rest and in transit. While reviewing their network operations, the IT department must ensure that this policy is being enforced. Which activity would best align with monitoring compliance with this policy?

  • Configure firewall rule sets to block unauthorized access to sensitive information

  • Review user permissions and access controls regarding sensitive data

  • Monitor data flow on the network for unencrypted data packets

  • Analyze file access logs for unauthorized access attempts

This question's topic:
CompTIA Network+ N10-008 / 
Network Operations
Your Score:
Network Operations
Networking Fundamentals
Network Implementations
Network Security
Network Troubleshooting