SomeCompany, Ltd. wishes to adopt the Adaptive Threat Defense architecture in their security policy. Identify three components of the anti-X defense pillar. (Choose three.)
A.
anomaly detection
B.
application-level role-based access control
C.
distributed denial-of-service mitigation
D.
transaction privacy
E.
URL filtering
F.
network auditing