Which of the following would most likely be deployed to obtain and analyze attacker activity and techniques?
Which of the following is used to protect a computer from viruses, malware, and Trojans being installed and moving laterally across the network?
A systems administrator wants to prevent users from being able to access data based on their responsibilities. The administrator also wants to apply the required access structure via a simplified format. Which of the following should the administrator apply to the site recovery resource group?
A systems administrator is creating a script that would save time and prevent human error when performing account creation for a large number of end users. Which of the following would be a good use case for this task?