This looks like a straightforward question on detective controls for malicious attacks. I'll start by reviewing the options and thinking through which one is not a detective control.
This seems like a tricky one. I'd need to really dig into the details to figure out the root cause. Definitely going to need to review the SLAs and OLAs closely.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Judy
5 months agoKenneth
6 months agoShawn
6 months agoTasia
6 months agoLorenza
6 months agoThaddeus
6 months agoDeeann
6 months agoFernanda
6 months agoGracia
6 months agoFelicidad
6 months agoJolene
6 months agoSantos
6 months ago