Which of the following best describes a detective control designed to protect an organization from cyberthreats and attacks?
A . A list of trustworthy, good traffic and a list of unauthorized, blocked traffic.
B . Monitoring for vulnerabilities based on industry intelligence.
C . Comprehensive service level agreements with vendors.
D . Firewall and other network perimeter protection tools.
Answer: B
Latest IIA-CIA-Part3 Dumps Valid Version with 402 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund