Microsoft Exam Questions

Which of the following is a security protocol that is used to protect data from being modified, corr

Which of the following is a security protocol that is used to protect data from being modified, corrupted, or accessed without authorization?

A.
Honeypot

B.
IP Security (IPsec)

C.
DNSSEC

D.
Protocol spoofing