Which of the following is essential for 'secure software development'?


What is the primary goal of 'penetration testing'?


Which of the following best describes 'malware'?


What is the significance of 'data minimization' in information security?


Which of the following is a critical aspect of 'network security monitoring'?


What is the role of 'data classification' in protecting information assets?


Which of the following best describes 'phishing'?


What is the primary objective of 'incident response' in information security?


Which of the following is a key benefit of using 'encryption' for data protection?


What is the purpose of implementing 'role-based access control' (RBAC)?