Question 296

Which of the following controls would BEST identify and report malicious insider activities?
  • Question 297

    A company recently experienced an attack during which its main website was directed to the attacker's web server, allowing the attacker to harvest credentials from unsuspecting customers. Which of the following should the company implement to prevent this type of attack occurring in the future?