An outward-facing IP address used to access the Internet.
Correct Answer:C
DevOps team has updated the application source code, Tom has discovered that many unauthorized changes have been made. What is the BEST control Tom can implement to prevent a recurrence of this problem?
Correct Answer:D
A popular way of implementing "least privilege''
Correct Answer:C
An employee unintentionally shares confidential information with an unauthorized party. What term best describes this situation?
Correct Answer:D
Events with a negative consequence, such as system crashes, network packet floods, unauthorized use of system privileges, defacement of a web page or execution of malicious code that destroys data.
Correct Answer:C