Which three statements about the monitoring stage of the Security Wheel are true?

Which three statements about the monitoring stage of the Security Wheel are true? Choose three.

Which three statements about the monitoring stage of the Security Wheel are true? Choose three.

A.
It involves system auditing and real-time intrusion detection

B.
It involves the use of security assessments and vulnerability scanning

C.
Adjustments are made to the security policy as security vulnerabilities and risks are identified.

D.
It detects violations to the security policy.

E.
It validates the security implementation in step 1.

F.
New security policies are created during this stage.



Leave a Reply 0

Your email address will not be published. Required fields are marked *