List of questions
Related questions
Question 96 - CISM discussion
Which of the following security processes will BEST prevent the exploitation of system vulnerabilities?
A.
Intrusion detection
B.
Log monitoring
C.
Patch management
D.
Antivirus software
Your answer:
0 comments
Sorted by
Leave a comment first