Which of the following risk mitigation strategies would also need to be implemented to reduce the number of network outages due to unauthorized changes?
Which of the following security account management techniques should a security analyst implement to prevent staff, who has switched company roles, from exceeding privileges?
Which of the following security strategies allows a company to limit damage to internal systems and provides loss control?