Which security strategy is implemented during the After phase of the before-during-after model?
A.
detect
B.
enforce
C.
discover
D.
remediate
Which security strategy is implemented during the After phase of the before-during-after model?
Which security strategy is implemented during the After phase of the before-during-after model?
A.
detect
B.
enforce
C.
discover
D.
remediate