Question:
Using a software program. Using automated tools ensures that the process of collecting, analyzing, and reporting the information is consistent and efficient.
Author: John IntindoloAnswer:
How should the security information that is captured by an organization's information security continuous monitoring (ISCM) program be collected, analyzed, and reported upon? - By the network administrator - By the end user - Using a software program - By the security administrator
0 / 5 Â (0 ratings)
1 answer(s) in total