Related questions
Question 263 - IIA-CIA-Part3 discussion
Which of the following is a cybersecurity monitoring activity intended to deter disruptive codes from being installed on an organizations systems?
A.
Boundary defense
B.
Malware defense.
C.
Penetration tests
D.
Wireless access controls
Your answer:
0 comments
Sorted by
Leave a comment first