Example of a technical control:
A system crash results in loss of data. What term best describes this?
A company wants employees to access resources from anywhere in the world. Which access control model is best?
Which access control method uses attributes and rules evaluated by a central Policy Decision Point (PDP)?
A measure of an organization’s baseline security performance is a:
What is remanence?
If a device is found to be non-compliant with the security baseline, what action should the security team take?
Faking the sender address to gain unauthorized access is known as:
Removing the design belief that the network has any trusted space. Security is managed at each possible level, representing the most granular asset. Microsegmentation of workloads is a tool of the model.
Which threat is directly associated with malware?