Which of the following security techniques is MOST appropriate to do this?

The information security technician wants to ensure security controls are deployed and functioning
as intended to be able to maintain an appropriate security posture. Which of the following security
techniques is MOST appropriate to do this?

The information security technician wants to ensure security controls are deployed and functioning
as intended to be able to maintain an appropriate security posture. Which of the following security
techniques is MOST appropriate to do this?

A.
Log audits

B.
System hardening

C.
Use IPS/IDS

D.
Continuous security monitoring

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *