Question 1
Which of the following best describes the concept of 'role-based access control' (RBAC)?
Question 2
Which of the following is a key advantage of using public key infrastructure (PKI) in secure communications?
Question 3
Which of the following best describes the purpose of a security audit?
Question 4
Which of the following best describes the concept of 'session management' in web security?
Question 5
Which of the following best describes a 'replay attack' in computer security?