Which of the following controls would prevent an employee from emailing unencrypted information to their personal email account over the corporate network?
Which of the following controls mitigates the risk of Matt, an attacker, gaining access to a company network by using a former employee’s credential?
Which of the following security awareness training is BEST suited for data owners who are concerned with protecting the confidentiality of their data?