List of questions
Related questions
Question 388 - CISM discussion
Which of the following is the BEST defense-in-depth implementation for protecting high value assets or for handling environments that have trust concerns?
A.
Compartmentalization
B.
Overlapping redundancy
C.
Continuous monitoring
D.
Multi-factor authentication
Your answer:
0 comments
Sorted by
Leave a comment first