A security manager needs to assess the security posture of one of the organization's vendors. The contract with the vendor does not allow for auditing of the vendor's security controls. Which of (he following should the manager request to complete the assessment?
A company is implementing a new SIEM to log and send alerts whenever malicious activity is blocked by its antivirus and web content filters. Which of the following is the primary use case for this scenario?
Which of the following would be the best resource for a software developer who is looking to improve secure coding practices for web applications?
Which of the following best describes configuring devices to log to a centralized, off-site location for possible future reference?