which of the following stops network traffic when the traffic is not identified in the firewall ruleset?
which of the following protocols uses multiple-challenge responses for authentication, authorization and audit?
Which of the following devices is used to optimize and distribute data workloads across multiple computers or networks?
Which of the following is the BEST security control that should be performed in conjunction with updating the application to the MOST current version?
Which of the following is a trusted OS implementation used to prevent malicious or suspicious code from executing on Linux and UNIX platforms?