Which security strategy is implemented during the After phase of the before-during-after model?
A. detect
B. enforce
C. discover
D. remediate
Which security strategy is implemented during the After phase of the before-during-after model?
A. detect
B. enforce
C. discover
D. remediate