The information security technician wants to ensure security controls are deployed and functioning
as intended to be able to maintain an appropriate security posture. Which of the following security
techniques is MOST appropriate to do this?
A.
Log audits
B.
System hardening
C.
Use IPS/IDS
D.
Continuous security monitoring
Explanation: