Which of the following cybersecurity-related activities is most likely to be performed by the second line of defense?

Posted by: Pdfprep Category: IIA-CIA-Part3 Tags: , ,

Which of the following cybersecurity-related activities is most likely to be performed by the second line of defense?
A . Deploy intrusion detection systems and conduct penetration testing
B . Administer security procedures, training, and testing.
C . Monitor incidents, key risk indicators, and remediation
D . implement vulnerability management with internal and external scans.

Answer: D

Leave a Reply

Your email address will not be published.