Which of the following is MOST effective against system intrusions?
A. Continuous monitoring
B. Layered protection
C. Penetration testing
D. Two-factor authentication
A. Continuous monitoring
B. Layered protection
C. Penetration testing
D. Two-factor authentication