What is the purpose of conducting a vulnerability assessment?


Which of the following best describes 'multi-factor authentication' (MFA)?


What is a common method used to authenticate users in an IT system?


What is the main objective of implementing access controls in an information system?


Which of the following is a key component of an organization's information security policy?


What is the role of an Intrusion Detection System (IDS)?


Which of the following best describes a firewall's function?


What is the primary purpose of data encryption?