Which of the following security techniques is MOST appropriate to do this?

The information security technician wants to ensure security controls are deployed and
functioning as intended to be able to maintain an appropriate security posture. Which of the
following security techniques is MOST appropriate to do this?

The information security technician wants to ensure security controls are deployed and
functioning as intended to be able to maintain an appropriate security posture. Which of the
following security techniques is MOST appropriate to do this?

A.
Log audits

B.
System hardening

C.
Use IPS/IDS

D.
Continuous security monitoring



Leave a Reply 0

Your email address will not be published. Required fields are marked *