Knowledge check

Completed
1.

Why is network segmentation suited to limit the scope of a breach?

2.

Your organization wants to implement threat protection on its network. How should it do this?

3.

Why is it important to ensure that all data on your network is encrypted?