Which security control provides logical isolation of devices on Ethernet?
A backup administrator has defined a backup policy where full backups are scheduled at 8 PM every Saturday and differential backups for the rest of the week at same time. A data loss happened on Friday at 11 AM. How many backup copies are required to restore the requested files?
At which layer is the risk of backup data recovered to an unauthorized destination considered a security threat?