Which of the following IT-related activities is most commonly performed by the second line of defense?

Which of the following IT-related activities is most commonly performed by the second line of defense?
A . Block unauthorized traffic.
B. Encrypt data.
C. Review disaster recovery test results.
D. Provide independent assessment of IT security.

Answer: C

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments