What logs should an application server retain in order to prevent phishing attacks while minimizing data retention?
A) Limited-retention, de-identified logs including only metadata.
B) Limited-retention, de-identified logs including the links clicked in messages as well as metadata.
C) Limited-retention logs including the identity of parties sending and receiving messages as well as metadata.
D) Limited-retention logs including the links clicked in messages, the identity of parties sending and receiving them, as well as metadata.
Correct Answer:
Verified
Q103: SCENARIO Please use the following to answer
Q104: What is typically NOT performed by sophisticated
Q105: Properly configured databases and well-written website codes
Q106: A privacy engineer reviews a newly developed
Q107: Which of the following statements is true
Q109: Which of the following would be the
Q110: SCENARIO Please use the following to answer
Q111: SCENARIO Please use the following to answer
Q112: Which of the following statements best describes
Q113: An EU marketing company is planning to
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents