CCNA Cyber Ops FAQ: Threat Analysis Q1. You must have adequate control mechanisms in order to enforce and ensure that data is only accessed by the individuals who should be allowed to access it and nobody else. Which of the following techniques can be used to prevent any attacks that could impact confidentiality? A. Secure routing protocols B. Network scanners C. … [Read more...]