Which of the following is MOST effective against system intrusions?
A. Two-factor authentication
B. Continuous monitoring
C. Layered protection
D. Penetration testing
A. Two-factor authentication
B. Continuous monitoring
C. Layered protection
D. Penetration testing