A continuous information security monitoring program can BEST reduce risk through which of the following?
A. C
ollecting security events and correlating them to identify anomalies
B. Facilitating system-wide visibility into the activities of critical user accounts
C. Encompassing people, process, and technology
D. Logging both scheduled and unscheduled system chang
es