Which of the following IT-related activities is most commonly performed by the second line of defense?
A . Block unauthorized traffic.
B . Encrypt data.
C . Review disaster recovery test results.
D . Provide independent assessment of IT security.
Answer: C
Latest IIA-CIA-Part3 Dumps Valid Version with 402 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund