Question: Please solve both Questions carefully.. Thanks 50- multiple end users have reported a deluge of unsolicited email messages they are receiving on a daily basis.
Please solve both Questions carefully.. Thanks

50- multiple end users have reported a deluge of unsolicited email messages they are receiving on a daily basis. Which of the following technologies could stem the flow of those messages while ensuring valid messages to still reach their destination? A) Stateful firewall B) Spam filter C) Access control list D) URL content filter 51- A Security technician is reviewing a new vendor's practices for a project, but the vendors only supply SLA you documentation. Which of the following should the security technician request to understand the vendor's adherence own policies? A) Controls data audits B) Entry log audits C) Access log audits D) Security log audits
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
