Which of the following allows a company to maintain access to encrypted resources when employee turnover is high?
Which of the following devices will help prevent a laptop from being removed from a certain location?
Which of the following protocols is used to authenticate the client and server’s digital certificate?
Which of the following security concepts would Sara, the security administrator, use to mitigate the risk of data loss?