Multiple Choice
What logs should an application server retain in order to prevent phishing attacks while minimizing data retention?
A) Limited-retention, de-identified logs including only metadata.
B) Limited-retention, de-identified logs including the links clicked in messages as well as metadata.
C) Limited-retention logs including the identity of parties sending and receiving messages as well as metadata.
D) Limited-retention logs including the links clicked in messages, the identity of parties sending and receiving them, as well as metadata.
Correct Answer:

Verified
Correct Answer:
Verified
Q65: SCENARIO You have just been hired by
Q66: A vendor has been collecting data under
Q67: What tactic does pharming use to achieve
Q68: Which of these actions is NOT generally
Q69: Which of the following became a foundation
Q71: What privacy risk is NOT mitigated by
Q72: What is the goal of privacy enhancing
Q73: SCENARIO Kyle is a new security compliance
Q74: Which of the following is a vulnerability
Q75: SCENARIO Please use the following to answer