Which two pieces of information are considered personally identifiable information (PII)? (Choose two.)
Which technology grants enhanced visibility and threat prevention locally on a device?
When signature-based antivirus software detects malware, what three things does it do to provide protection? (Choose three.)
Systems that allow for accelerated incident response through the execution of standardized and automated playbooks that work upon inputs from security technology and other data flows are known as what?