Which of the following should John use to accomplish the task?

John works as a Desktop Technician for NetPerfect Inc. The company has a Windows-based
network. For the last few days, the network of the company has become prone to the Man-in-theMiddle attack. John wants to send a confidential MS-Word file to his Manager through e-mail
attachment. He wants to ensure that no one is able to open and understand the file’s message
except the Manager. Which of the following should John use to accomplish the task?
Each correct answer represents a part of the solution. Choose all that apply.

John works as a Desktop Technician for NetPerfect Inc. The company has a Windows-based
network. For the last few days, the network of the company has become prone to the Man-in-theMiddle attack. John wants to send a confidential MS-Word file to his Manager through e-mail
attachment. He wants to ensure that no one is able to open and understand the file’s message
except the Manager. Which of the following should John use to accomplish the task?
Each correct answer represents a part of the solution. Choose all that apply.

A.
Format the file

B.
Apply password to the file

C.
Encryption

D.
File Compression

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *