_____________applies enterprise architecture concepts and practices in the information security domain.
A.
ESA
B.
OWASP
C.
OVAL
D.
AAR
Explanation:
Enterprise Security Architecture (ESA) is a system for applying network architecture principles and guidelines to network security.Answer option D is incorrect. An After Action Report (AAR) is conducted to assess what went wrong after a breach.
Answer option C is incorrect. Open Vulnerability and Assessment Language (OVAL) is a standard to assess vulnerabilities in a system.
Answer option B is incorrect. The Open Web Application Security Project (OWASP) is a set of standards for security web applications.