is a technique often used to hide items (such as data centers) in plain site by using anonymity to guard against espionage, theft or sabotage. O Security through diversity O Security through obscurity O Security through availability O Security through promiscuity M pis allows users within an organization to access its network and computer resources from locations outside the organization's premises. --- O Data security standards O Remote access O Communication systems O Encryption _helps ensure that standard processes or requirements are followed and that control is maintained. O Management tools O Oversight and tracking O Resource management O Planning is a broad category of resources that allows for tracking people, progress on tasks, costs, and other project metrics and complexities. O Planning O Resource management O Oversight and tracking O Management tools 7 O CPM The is the PMI's foundational certification that validates the project manager's skills, knowledge, and experience in bringing projects to successful completion. O PMP O ASC O CPMP