A company prevented direct access from the database administrators’ workstations to the network segment that contains database servers. Which of the following should a database administrator use to access the database servers?
Which of the following security control types does an acceptable use policy best represent?
An IT manager informs the entire help desk staff that only the IT manager and the help desk lead will have access to the administrator console of the help desk software. Which of the following security techniques is the IT manager setting up?
Which of the following is the most likely to be used to document risks, responsible parties, and thresholds?
Which of the following should a security administrator adhere to when setting up a new set of firewall rules?
A security administrator would like to protect data on employees’ laptops. Which of the following encryption techniques should the security administrator use?