Social engineering, password cracking and vulnerability exploitation are examples of which of the following?
Configuration baselines should be taken at which of the following stages in the deployment of a new system?
To evaluate the security compliance of a group of servers against best practices, which of the following BEST applies?