Which of the following controls would prevent an employee from emailing unencrypted information to their personal email account over the corporate network?
Which of the following security awareness training is BEST suited for data owners who are concerned with protecting the confidentiality of their data?
Which of the following can the security administrator implement to mitigate the risk of an online password attack against users with weak passwords?