A user can successfully connect to a database server from a home office but is unable to access it from a hotel room. Which of the following authentication methods is most likely
configured?
A company is running an application on a file server. A security scan reports the application has a known vulnerability. Which of the following would be the company’s BEST course of action?
Which of the following are measures that should be taken when a data breach occurs? (Select TWO).
Which of the following backup types copies changed data from a server and then combines the backups on the backup target?