A systems ability to identify a particular individual, track their actions, and monitor their behavior is known as:
Much like the layers of an onion, ______________ is a comprehensive set of security solutions layered to provide the best protection.
A ___________ is a program that poses as a useful or legitimate program, but turns out to be malicious code.