Which of the following should be used to aggregate log data in order to create alerts and detect anomalous activity?
Which of the following best describes why me SMS DIP authentication method is more risky to implement than the TOTP method?
A bank set up a new server that contains customers' Pll. Which of the following should the bank use to make sure the sensitive data is not modified?
Which of the following exercises should an organization use to improve its incident response process?