A company wants to prevent proprietary and confidential company information from being shared to outsiders. Which of the following would this best describe?
An employee receives a text message from an unrecognized number claiming to be the Chief Executive Officer and asking the employee to purchase gift cards. Which of the following types of attacks describes this example?
A business provides long-term cold storage services to banks that are required to follow regulator-imposed data retention guidelines. Banks that use these services require that data is disposed of in a specific manner at the conclusion of the regulatory threshold for data retention. Which of the following aspects of data management is the most important to the bank in the destruction of this data?
Which of the following is used to calculate the impact to an organization per cybersecurity incident?
Which of the following should be used to ensure a user has the permissions needed to effectively do an assigned job role?
Which of the following would most likely be a hacktivist's motive?