Which of the following security account management techniques should a security analyst implement to prevent staff, who has switched company roles, from exceeding privileges?
Which of the following security strategies allows a company to limit damage to internal systems and provides loss control?
Which of the following controls could be utilized to minimize the risk involved with the use of USB drives?
Which of the following controls would prevent an employee from emailing unencrypted information to their personal email account over the corporate network?
Which of the following are Data Loss Prevention (DLP) strategies that address data in transit issues?