Which of the following concepts is BEST described as developing a new chain of command in the event of a contingency?
Which of the following allows a company to maintain access to encrypted resources when employee turnover is high?
Which of the following devices will help prevent a laptop from being removed from a certain location?
Which of the following protocols is used to authenticate the client and server’s digital certificate?