PdfPrep.com

Which of the following cybersecurity-related activities is most likely to be performed by the second line of defense?

Which of the following cybersecurity-related activities is most likely to be performed by the second line of defense?
A . Deploy intrusion detection systems and conduct penetration testing
B . Administer security procedures, training, and testing.
C . Monitor incidents, key risk indicators, and remediation
D . implement vulnerability management with internal and external scans.

Answer: D

Exit mobile version