254. Which principle reduces the risk of attackers gaining access to sensitive data by compromising a...
268. Endpoint logs indicate that a machine has obtained an unusual gateway address and unusual DNS...

