Auditing makes the most sense to me. That's the pillar that deals with tracking and recording user interactions, including the specific resources they access. I feel pretty confident about this one.
I think B is the correct answer. Vulnerability management policies should outline the necessary actions to take when vulnerabilities are found in the customer's environment.
Ronald
4 months agoJesusa
4 months agoKarl
4 months agoRonny
4 months agoElvis
4 months agoTemeka
5 months agoCasie
5 months agoDouglass
5 months agoDenny
5 months agoHildegarde
5 months agoEva
5 months agoMarta
5 months agoSolange
9 months agoCristy
9 months agoLucy
9 months agoFrancine
9 months agoJenifer
10 months agoDwight
8 months agoJillian
8 months agoReiko
9 months agoMarcos
10 months agoTiara
9 months agoQuiana
9 months agoHoa
9 months agoLacey
10 months agoArdella
8 months agoNieves
8 months agoLeana
8 months agoNieves
9 months agoNoble
9 months agoFlorencia
9 months agoKing
9 months agoTalia
10 months agoTora
11 months agoCorinne
9 months agoZena
10 months agoTamar
11 months agoVon
11 months agoTamar
11 months ago