Which of the following would be a risk practitioner’s BEST recommendation for preventing cyber intrusion?
A. Implement data loss prevention (DLP) tools.
B. Implement network segregation.
C. Establish a cyber response plan.
D. Strengthen vulnerability remediation efforts.
A. Implement data loss prevention (DLP) tools.
B. Implement network segregation.
C. Establish a cyber response plan.
D. Strengthen vulnerability remediation efforts.