A company has decided to process credit card transactions directly. Which of the following would meet the requirements for scanning this type of data?
During the forensic phase of a security investigation, it was discovered that an attacker was able to find private keys on a poorly secured team shared drive. The attacker used those keys to intercept and decrypt sensitive traffic on a web server. Which of the following describes this type of exploit and the potential remediation?
A security analyst begins to notice the CPU utilization from a sinkhole has begun to spike. Which of the following describes what may be occurring?
An organization is experiencing degradation of critical services and availability of critical external resources. Which of the following can be used to investigate the issue?