Which of the following IT-related activities is most commonly performed by the second line of defense?

Which of the following IT-related activities is most commonly performed by the second line of defense?
A . Block unauthorized traffic.
B . Encrypt data.
C . Review disaster recovery test results.
D . Provide independent assessment of IT security.

Answer: C

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments