Duke would like to restrict users from accessing a list of prohibited websites while connected to his network. Which control would BEST achieve this objective?
Which threat is directly associated with malware?
Which is very likely to be used in a Disaster Recovery effort?
Which type of application can intercept sensitive information such as passwords on a network segment?