Which of the following techniques can be used to sanitize the data contained on a hard drive while allowing for the hard drive to be repurposed?
During a routine audit, an analyst discovers that a department uses software that was not vetted. Which threat is this?
After a company was compromised, customers initiated a lawsuit. The company's attorneys have requested that the security team initiate a legal hold in response to the lawsuit. Which of the following describes the action the security team will most likely be required to take?
Which of the following is a type of vulnerability that involves inserting scripts into web-based applications in order to take control of the client's web browser?