Which of the following implementations of a continuous monitoring risk mitigation strategy is
correct?
A.
Audit successful and failed events, transfer logs to a centralized server, institute computer
assisted audit reduction, and email alerts to NOC staff hourly.
B.
Audit successful and critical failed events, transfer logs to a centralized server once a month,
tailor logged event thresholds to meet organization goals, and display alerts in real time when
thresholds are approached.
C.
Audit successful and failed events, transfer logs to a centralized server, institute computer
assisted audit reduction, tailor logged event thresholds to meet organization goals, and display
alerts in real time when thresholds are exceeded.
D.
Audit failed events only, transfer logs to a centralized server, implement manual audit reduction,
tailor logged event thresholds to meet organization goals, and display alerts in real time when
thresholds are approached and exceeded.