What is the most secure device or system failure option?
C. Fail-secure.
To what item or application is a malicious add-on attached?
D. Web browser.
What is the term for the security measures put in place to scare off an attacker or to ward off an attack?
A. Deterrence.
Which of a system's log files contains entries on login or logout activities, including failed login attempts?
Application log.
B. Access log.
C. Audit log.
D. Security log.