Availability can be protected through the use of:
A . user awareness training and related end-user training.
B . access controls. We permissions, and encryption.
C . logging, digital signatures, and write protection.
D . redundancy, backups, and business continuity management
Answer: D
Latest Cybersecurity Audit Certificate Dumps Valid Version with 75 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund