Which of the following is MOST effective against system intrusions?
A . Continuous monitoring
B . Layered protection
C . Penetration testing
D . Two-factor authentication
Answer: B
Which of the following is MOST effective against system intrusions?
A . Continuous monitoring
B . Layered protection
C . Penetration testing
D . Two-factor authentication
Answer: B