The system administrator has deployed updated security controls for the network to limit risk of
attack. The security manager is concerned that controls continue to function as intended to
maintain appropriate security posture.
Which of the following risk mitigation strategies is MOST important to the security manager?
A.
User permissions
B.
Policy enforcement
C.
Routine audits
D.
Change management
Routine audits are more of a management control function than a risk mitigation strategy. They are a part of a risk mitigation strategy, but to my way of thinking not a risk mitigation strategy in and of itself.