Notifications
Clear all
Topic starter
22/08/2022 5:34 pm
Which of the following would BEST enable management to be aware of an electronic breach to an externally hosted database?
- A . Implement a dedicated firewall configured to block suspicious activity.
- B . Obligate the vendor to report suspicious activity and database breaches.
- C . Implement tog monitoring of the database environment for suspicious activity.
- D . Review independent audit reports of the vendors data center environment.
Suggested Answer: B