Which security strategy is implemented in the During phase of the before-during-after model?
A.
remediate
B.
detect
C.
scope
D.
discover
Which security strategy is implemented in the During phase of the before-during-after model?
Which security strategy is implemented in the During phase of the before-during-after model?
A.
remediate
B.
detect
C.
scope
D.
discover