Which of the following activities BEST identifies operational problems, security misconfigurations, and malicious attacks?

Which of the following activities BEST identifies operational problems, security misconfigurations,
and malicious attacks?

Which of the following activities BEST identifies operational problems, security misconfigurations,
and malicious attacks?

A.
Policy documentation review

B.
Authentication validation

C.
Periodic log reviews

D.
Interface testing



Leave a Reply 0

Your email address will not be published. Required fields are marked *

18 + nineteen =