A security architect wants to prevent employees from receiving malicious attachments by email. Which of the following functions should the chosen solution do?
Attackers created a new domain name that looks similar to a popular file-sharing website. Which of the following threat vectors is being used?
Which of the following describes the difference between encryption and hashing?
Which of the following should be used to select a label for a file based on the file's value, sensitivity, or applicable regulations?