The information security technician wants to ensure security controls are deployed and
functioning as intended to be able to maintain an appropriate security posture. Which of the
following security techniques is MOST appropriate to do this?
A.
Log audits
B.
System hardening
C.
Use IPS/IDS
D.
Continuous security monitoring