Which of the following represents a multifactor authentication system?
An organization has hired a security analyst to perform a penetration test. The analyst captures 1GB worth of inbound network traffic to the server and transfers the pcap back to the machine for analysis. Which of the following tools should the analyst use to future review the pcap?
Which of the following Is a resiliency strategy that allows a system to automatically adapt to workload changes?
Employees receive a benefits enrollment email from the company's human resources department at the beginning of each year. Several users have reported receiving the email but are unable to log in to the website with their usernames and passwords. Users who enter the URL for the human resources website can log in without issue. Which of the following security issues is occurring?
Which of the following is a risk that is specifically associated with hosting applications in the public cloud?