The system administrator has deployed updated security controls for the network to limit risk of attack. The security manager is concerned that controls continue to function as intended to maintain appropriate security posture. Which of the following risk mitigation strategies is MOST important to the security manager?

A. User permissions
B. Policy enforcement
C. Routine audits
D. Change management

Ans: C. Routine audits

Computer Science & Information Technology

You might also like to view...

Excel includes a group of ________ features, which consist of tools and commands accessible from the formulas tab that help you check your worksheet for errors

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following protocols are enabled by default on a Cisco router for external users to access?

A) Telnet B) SSH C) Both Telnet and SSH D) Neither Telnet nor SSH

Computer Science & Information Technology