Which of the following ports and protocol types must be opened on a host with a host-based firewall to allow incoming SFTP connections?
Which of the following controls can be implemented together to prevent data loss in the event of theft of a mobile device storing sensitive information?
which of the following steps of incident response does a team analyze the incident and determine steps to prevent a future occurrence?