Register
9:00
Stop
CISSP - Security Audit and Monitoring - Configuration Management and Compliance
Intermediate
1/9
During a security architecture review, you find that a company's critical systems are vulnerable to insider threats. Which approach would be most effective in addressing this issue?
a.
Deploy advanced intrusion detection and prevention systems
b.
Implement the principle of least privilege
c.
Increase the frequency of security audits and penetration testing
d.
Enhance physical security measures in the data center
Intermediate