Which of the following techniques enables a highly secured organization to assess security weaknesses in real
time?
A.
Access control lists
B.
Continuous monitoring
C.
Video surveillance
D.
Baseline reporting
Explanation:
Continuous monitoring point toward the never-ending review of what resources a user actually accesses, which
is critical for preventing insider threats. Because the process is never-ending, assessments happen in real time.