Which of the following is the best method to reduce the attack surface of an enterprise network?
Which of the following would be the best ways to ensure only authorized personnel can access a secure facility? (Select two).
A security analyst is investigating a workstation that is suspected of outbound communication to a command-and-control server. During the investigation, the analyst discovered that logs on the endpoint were deleted. Which of the following logs would the analyst most likely look at next?
Which of the following security concepts is the best reason for permissions on a human resources fileshare to follow the principle of least privilege?