Which of the following is a critical aspect of 'network security monitoring'?


What is the role of 'data classification' in protecting information assets?


Which of the following best describes 'phishing'?


What is the primary objective of 'incident response' in information security?


Which of the following is a key benefit of using 'encryption' for data protection?


What is the purpose of implementing 'role-based access control' (RBAC)?


Which of the following best describes 'data integrity'?


What is the significance of 'security awareness training' for employees?


Which of the following is essential for ensuring secure wireless communication?


What is the role of 'endpoint security' in protecting information assets?