This is a tricky one. I feel like I know the concepts, but translating them to the specific wording of the question is challenging. I'm leaning towards option A, but I'm not 100% confident. Maybe I'll eliminate a couple options first before making my final decision.
Okay, let me think this through. A continuous monitoring program needs to cover people, processes, and technology, so option C seems like a good choice. But I'm also wondering if option B about visibility into critical user accounts could be important too. I'll have to weigh the pros and cons of each.
Hmm, I'm a bit unsure about this one. I know continuous monitoring is important for reducing risk, but I'm not sure which of these options is the BEST approach. I might need to review my notes on the different components of a monitoring program.
This looks like a pretty straightforward question. I think the key is to focus on the term "continuous information security monitoring program" and what that entails. I'd go with option A - collecting security events and correlating them to identify anomalies.
Minna
4 months agoLanie
4 months agoSharita
4 months agoEdward
4 months agoBecky
5 months agoArlene
5 months agoKenny
5 months agoYun
5 months agoErinn
5 months agoOzell
6 months agoLavelle
6 months agoArlene
6 months agoHoa
6 months agoGilma
7 months agoTayna
7 months agoJames
8 months agoLauryn
8 months agoOdelia
7 months agoGilma
8 months ago