A network administrator has determined that network performance has degraded due to excessive use of
social media and Internet streaming services. Which of the following would be effective for limiting access to these types of services, without completely restricting access to a site?
Which of the following technologies would reduce the risk of a successful SQL injection attack?
How does encryption work to protect information on remote workers' computers?
What is the primary role of an intrusion detection system (IDS) on a network?
Which of the following enables security personnel to have the BEST security incident recovery practices?
An organization recently suffered a breach due to a human resources administrator emailing employee names and Social Security numbers to a distribution list. Which of the following tools would help mitigate this risk from recurring?
The statement of applicability (SOA) document forms a fundamental part of which framework?