Challenge—Events

Evaluate your understanding of textbook security events.

We'll cover the following...
Place the appropriate event under the device from which it’s most likely to stem.

Drag and drop the cards in the blank spaces.


...