Which of the following activities BEST identifies operational problems, security misconfigurations,
and malicious attacks?
A.
Policy documentation review
B.
Authentication validation
C.
Periodic log reviews
D.
Interface testing
Which of the following activities BEST identifies operational problems, security misconfigurations,
and malicious attacks?
Which of the following activities BEST identifies operational problems, security misconfigurations,
and malicious attacks?
A.
Policy documentation review
B.
Authentication validation
C.
Periodic log reviews
D.
Interface testing