A bank insists all of its vendors must prevent data loss on stolen laptops. Which of the following strategies is the bank requiring?
A user downloads a patch from an unknown repository… FIM alerts indicate OS file hashes have changed. Which attack most likely occurred?
A security team purchases a tool for cloud security posture management. The team is quickly overwhelmed by the number of misconfigurations that the tool detects. Which of the following should the security team configure to establish workflows for cloud resource security?
Which of the following is a use of CVSS?