Free CompTIA Network+ N10-008 Practice Question

A company has recently adopted a policy requiring all sensitive data to be encrypted both at rest and in transit. While reviewing their network operations, the IT department must ensure that this policy is being enforced. Which activity would best align with monitoring compliance with this policy?

  • Analyze file access logs for unauthorized access attempts

  • Review user permissions and access controls regarding sensitive data

  • Monitor data flow on the network for unencrypted data packets

  • Configure firewall rule sets to block unauthorized access to sensitive information

This question's topic:
CompTIA Network+ N10-008 / 
Network Operations
Your Score:

Check or uncheck an objective to set which questions you will receive.