Question 41
Which approach to risk management involves accepting the potential risk and not taking any specific action to mitigate it?
Question 42
What is vishing?
Question 43
Which network security feature helps protect against unauthorized data access and ensures confidentiality of sensitive information?
Question 44
What is the primary goal of vulnerability management?
Question 45
What is the main purpose of risk management in the context of cybersecurity?