Which of the following techniques enables a highly secured organization to assess security weaknesses in real time?

Which of the following techniques enables a highly secured organization to assess security
weaknesses in real time?

Which of the following techniques enables a highly secured organization to assess security
weaknesses in real time?

A.
Access control lists

B.
Continuous monitoring

C.
Video surveillance

D.
Baseline reporting

Explanation:
Continuous monitoring point toward the never-ending review of what resources a user actually
accesses, which is critical for preventing insider threats. Because the process is never-ending,
assessments happen in real time.



Leave a Reply 0

Your email address will not be published. Required fields are marked *

4 + eighteen =