COMPUTER NETWORKING

NETWORK SECURITY

INTRODUCTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
The security policies in a manufacturing company prohibit the transmission of customer information. However, a security administrator has received an alert that credit card numbers were transmitted as an email attachment. Which of the following MOST accurately describes the source of this alert message?
A
IPS
B
DLP
C
SMTP
D
IPsec
Explanation: 

Detailed explanation-1: -Normalization is a process of reducing redundancies of data in a database. Normalization is a technique that is used when designing and redesigning a database.

Detailed explanation-2: -There are three ongoing steps for adhering to the PCI DSS: Assess-identifying cardholder data, taking an inventory of your IT assets and business processes for payment card processing, and analyzing them for vulnerabilities that could expose cardholder data.

Detailed explanation-3: -Two common functions of a CASB are visibility into application use and data security policy use. Other common CASB functions are the verification of compliance with formal standards and the monitoring and identification of threats.

There is 1 question to complete.