Which of the following best describes 'insider threats'?


What is the primary objective of 'data backup and recovery' strategies?


Which of the following is a key benefit of 'endpoint encryption'?


What is the role of 'intrusion prevention systems' (IPS) in information security?


Which of the following best describes 'data at rest' encryption?


What is the significance of 'security auditing' in protecting information assets?


Which of the following is a critical aspect of 'data governance'?


What is the role of 'security policies' in an organization?


Which of the following best describes 'cloud security'?


What is the significance of 'data breach notification' policies?