Posted by: Pdfprep
Post Date: October 26, 2020
Which one of the following statements best describes the benefit of following the phases of the attack continuum?
A . Organizations are able to combat advanced persistent threats by having visibility and control across the extended network.
B . Organizations can use the attack continuum to provide a complete security posture, which will block and prevent all nefarious network activity and attacks
C . Organizations using the attack continuum are able to easily determine the identity of threat actors and the nature of their activities.
D . It is the first level of security for BYOD-based devices (including end-user phones, tablets, and personal computers) when they are connected to the enterprise environment.
Answer: A