A targeted email attack sent to Sara, the companys Chief Executive Officer (CEO), is known as which of the following?
Which of the following would be used when a higher level of security is desired for encryption key storage?
Which of the following MUST be updated immediately when an employee is terminated to prevent unauthorized access?