The information security technician wants to ensure security controls are deployed and functioning as intended to be able to maintain an appropriate security posture. Which of the following security techniques is MOST appropriate to do this?

A. Log audits
B. System hardening
C. Use IPS/IDS
D. Continuous security monitoring


Answer: D. Continuous security monitoring

Computer Science & Information Technology

You might also like to view...

You can change the paper size from the ________ tab

A) Home B) File C) Insert D) Page Layout

Computer Science & Information Technology

Both Dot and Mike need to know when new computers have been received. Create the NEW COMPUTER RECEIVED REPORT. The COMPUTER RECEIVED REPORT data flow contains the necessary elements.

What will be an ideal response?

Computer Science & Information Technology

The National Collegiate Athletic Association (NCAA) men's Division I basketball tournament, played in the United States each March, involves the best college teams in the nation, playing an elimination-style tournament. Games are played in rounds; winning teams in each round continue, while losers are eliminated. There are the following rounds: first round, second round, regional semifinal,

regional final, national semifinal, and national final. Many teams pair up to play games in the first round. Only the winners go on to play games in the second round, and only two teams survive to play in the final round. The winner of the final round becomes the national champion. From this information, How many teams begin the tournament?

Computer Science & Information Technology

Each component of the ________ and ________ contains real time graphs and detailed descriptions

Fill in the blank(s) with correct word

Computer Science & Information Technology