Which of the fallowing statements is MOST accurate regarding information assets?
An information security professional is reviewing user access controls on a customer-facing application. The application must have multi-factor authentication (MFA) in place. The application currently requires a username and password to login. Which of the following options would BEST implement MFA?
Which one of the following can be used to detect an anomaly in a system by keeping track of the state of files that do not normally change?\
Which Redundant Array c/ Independent Disks (RAID) Level does the following diagram represent?
What is the MAIN objective of risk analysis in Disaster Recovery (DR) planning?
Submit Cancel