4.1 Given a scenario, apply common security techniques to computing resources Flashcards