Which security strategy is implemented in the Before phase of the before-during-after model?
A.
remediate
B.
scope
C.
detect
D.
discover
Which security strategy is implemented in the Before phase of the before-during-after model?
Which security strategy is implemented in the Before phase of the before-during-after model?
A.
remediate
B.
scope
C.
detect
D.
discover