Which three statements about the monitoring stage of the Security Wheel are true? Choose three.
A.
It involves system auditing and real-time intrusion detection
B.
It involves the use of security assessments and vulnerability scanning
C.
Adjustments are made to the security policy as security vulnerabilities and risks are identified.
D.
It detects violations to the security policy.
E.
It validates the security implementation in step 1.
F.
New security policies are created during this stage.