Which one of the following statements best describes the benefit of following the phases of the attack continuum?

Posted by: Pdfprep Category: 210-250 Tags: , ,

Which one of the following statements best describes the benefit of following the phases of the attack continuum?
A . Organizations are able to combat advanced persistent threats by having visibility and control across the extended network.
B . Organizations can use the attack continuum to provide a complete security posture, which will block and prevent all nefarious network activity and attacks
C . Organizations using the attack continuum are able to easily determine the identity of threat actors and the nature of their activities.
D . It is the first level of security for BYOD-based devices (including end-user phones, tablets, and personal computers) when they are connected to the enterprise environment.

Answer: A