This looks like a straightforward question on detective controls for malicious attacks. I'll start by reviewing the options and thinking through which one is not a detective control.
This seems like a tricky one. I'd need to really dig into the details to figure out the root cause. Definitely going to need to review the SLAs and OLAs closely.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Judy
4 months agoKenneth
4 months agoShawn
4 months agoTasia
4 months agoLorenza
5 months agoThaddeus
5 months agoDeeann
5 months agoFernanda
5 months agoGracia
5 months agoFelicidad
5 months agoJolene
5 months agoSantos
5 months ago