Which of the following BEST describes using a smart card and typing in a PIN to gain access to a system?
Which of the following describes the process of removing unnecessary accounts and services from an application to reduce risk exposure?
Which of the following MUST Matt, a security administrator, implement to verify both the integrity and authenticity of a message while requiring a shared secret?
Which of the following software allows a network administrator to inspect the protocol header in order to troubleshoot network issues?
Which of the following ports would be blocked if Pete, a security administrator, wants to deny access to websites?
Which of the following would Pete, a security administrator, do to limit a wireless signal from penetrating the exterior walls?