One way to defeat a multi-level security solution is to leak data via
Which of the following is a detective control?
Which of the following examples best represents a logical or technical control?
Which type of access control is used on a router or firewall to limit network activity?