Question 11
What is the purpose of encryption in network security?
Question 12
What does "data integrity" refer to in the context of security?
Question 13
Which of the following best describes a vulnerability in the context of cybersecurity?
Question 14
Which of the following best defines "Techniques, Tactics, and Procedures (TTP)" in the context of cybersecurity investigations?
Question 15
Which of the following updates improve the functionality and security of installed software?