A user in the finance department uses a laptop to store a spreadsheet that contains confidential financial information for the company. Which of the following would be the BEST way to protect the file while the user travels between locations? (Choose two.)
A threat hunting team receives a report about possible APT activity in the network.Which of the following threat management frameworks should the team implement?
Device event logs sourced from MDM software as follows:Which of the following security concerns and response actions would BEST address the risks posed by the device in the logs?
An energy company is required to report the average pressure of natural gas used over the past quarter. A PLC sends data to a historian server that creates the required reports.Which of the following historian server locations will allow the business to get the required reports in an ׀׀¢ and IT environment?
Which of the following is a benefit of using steganalysis techniques in forensic response?
An organization is referencing NIST best practices for BCP creation while reviewing current internal organizational processes for mission-essential items.Which of the following phases establishes the identification and prioritization of critical systems and functions?