40. All of the following are reasons to implement a continuous monitoring solution, except:
(A) Ensure that any changes made are included in the updated standard security baseline.
(B) Detect changes to the configuration baseline.
(C) Detect security incidents.
(D) Ensure that unauthorized changes are reversed.
答案:登入後查看
統計: 尚無統計資料
統計: 尚無統計資料