This is a tricky one. I feel like I know the concepts, but translating them to the specific wording of the question is challenging. I'm leaning towards option A, but I'm not 100% confident. Maybe I'll eliminate a couple options first before making my final decision.
Okay, let me think this through. A continuous monitoring program needs to cover people, processes, and technology, so option C seems like a good choice. But I'm also wondering if option B about visibility into critical user accounts could be important too. I'll have to weigh the pros and cons of each.
Hmm, I'm a bit unsure about this one. I know continuous monitoring is important for reducing risk, but I'm not sure which of these options is the BEST approach. I might need to review my notes on the different components of a monitoring program.
This looks like a pretty straightforward question. I think the key is to focus on the term "continuous information security monitoring program" and what that entails. I'd go with option A - collecting security events and correlating them to identify anomalies.
Minna
2 months agoLanie
2 months agoSharita
3 months agoEdward
3 months agoBecky
3 months agoArlene
3 months agoKenny
4 months agoYun
4 months agoErinn
4 months agoOzell
4 months agoLavelle
4 months agoArlene
5 months agoHoa
5 months agoGilma
5 months agoTayna
5 months agoJames
6 months agoLauryn
6 months agoOdelia
5 months agoGilma
6 months ago