A hacker gains unauthorized access and steals confidential data. What term best describes this?
After an earthquake disrupts business operations, which document contains the reactive procedures required to return business to normal operations?
Which of the following vulnerabilities cannot be discovered during a routine vulnerability assessment?
Which principle states that users should have access only to the specific data and resources needed to perform required tasks?
Which type of application can intercept sensitive information such as passwords on a network segment?