What does an attacker use to determine which network ports are listening on a potential target device?
When an event is investigated, which type of data provides the investigate capability to determine if data exfiltration has occurred?
Which security principle requires more than one person is required to perform a critical task?
What is a difference between a threat and a risk?