What federal law requires the use of vulnerability scanning on information systems operated by federal government agencies?
What is the main purpose of using multi-factor authentication (MFA) in a security system?
Which document serves as specifications for implementing policy and dictates mandatory requirements?
What cybersecurity principle focuses on granting users only the privileges necessary to perform their job functions?