Which is an example of a deterrent control?
In which phase of an incident response plan are incidents prioritized?
Communication between end systems is encrypted using a key, often known as ________?
Which zero-trust component breaks LANs into very small, localized security zones?
An attacker places themselves between two communicating devices is known as:
How many bits represent the Organizationally Unique Identifier (OUI) in MAC addresses?
Which logical control best protects confidential data from unauthorized access?
In incident terminology, a zero-day is:
Which of the following is unlikely to be a member of the disaster recovery team?
A backup is which type of security control?