1. Which type of attack overwhelms a system to make it unavailable to legitimate users?
2. Which protocol is used to secure web browsing on port 443?
3. What does the principle of "least privilege" mean in access control?
4. Which of the following is a layer of physical security?
5. What does SIEM stand for?