What is personally identifiable information that must be safeguarded from unauthorized access?
Which are two denial-of-service attacks? (Choose two.)
What is a difference between SIEM and SOAR?
Why should an engineer use a full packet capture to investigate a security breach?