A security analyst is reviewing the security of a SaaS application that the company intends to purchase. Which of the following documentations should the security analyst request from the SaaS application vendor?
An MSSP manages firewalls for hundreds of clients. Which of the following tools would be most helpful to create a standard configuration template in order to improve the efficiency of firewall changes?
Which of the following threat actors is the most likely to use large financial resources to attack critical systems located in other countries?
Which of the following best describes the practice of researching laws and regulations related to information security operations within a specific industry?