What is the practice of giving employees only those permissions necessary to perform their specific role within an organization?
The SOC team detected an ongoing port scan. After investigation, the team concluded that the scan was targeting the company servers. According to the Cyber Kill Chain model, which step must be assigned to this type of event?
Refer to the exhibit.

Which application-level protocol is being targeted?
When communicating via TLS, the client initiates the handshake to the server and the server responds back with its certificate for identification.
Which information is available on the server certificate?
Which metric is used to capture the level of access needed to launch a successful attack?
Which action matches the weaponization step of the Cyber Kill Chain model?
Which filter allows an engineer to filter traffic in Wireshark to further analyze the PCAP file by only showing the traffic for LAN 10.11.x.x, between workstations and servers without the Internet?
Which type of access control depends on the job function of the user?
How does TOR alter data content during transit?
A security engineer deploys an enterprise-wide host/endpoint technology for all of the company's corporate PCs. Management requests the engineer to block a selected set of applications on all PCs.
Which technology should be used to accomplish this task?