Which of the following would a security administrator use to comply with a secure baseline during a patch update?
Which of the following are the best for hardening end-user devices? (Selecttwo)
Which of the following is a primary security concern for a company setting up a BYOD program?
A vendor needs to remotely and securely transfer files from one server to another using the command line. Which of the following protocols should be Implemented to allow for this type of access? (Select two).