Which of the following techniques enables a highly secured organization to assess security
weaknesses in real time?
A.
Access control lists
B.
Continuous monitoring
C.
Video surveillance
D.
Baseline reporting
Which of the following techniques enables a highly secured organization to assess security
weaknesses in real time?
Which of the following techniques enables a highly secured organization to assess security
weaknesses in real time?
A.
Access control lists
B.
Continuous monitoring
C.
Video surveillance
D.
Baseline reporting