Which of the following can be used on a smartphone to BEST protect against sensitive data loss if the device is stolen?
Which of the following should the security administrator implement to mitigate password cracking attacks?
Which of the following should Pete, a security manager, implement to reduce the risk of employees working in collusion to embezzle funds from their company?
Which of the following will allow Pete, a security analyst, to trigger a security alert because of a tracking cookie?