A set of security controls or system settings used to ensure uniformity of configuration through the IT environment?
What is a security token used to authenticate a user to a web application, typically after they log in?
A company wants to ensure that its employees can evacuate the building in case of an emergency. Which physical control is best suited?
Which principle states that users should have access only to the specific data and resources needed to perform required tasks?
TCP and UDP reside at which layer of the OSI model?
A centralized organizational function that monitors, detects, and analyzes security events to prevent disruptions is called:
Which activity is often associated with Disaster Recovery efforts?
A collection of actions that must be followed to complete a task or process in accordance with a set of rules is known as:
A common network device used to filter traffic?
Which is the loopback address?