Which security strategy is implemented in the During phase of the before-during-after model?
A. remediate
B. detect
C. scope
D. discover
Which security strategy is implemented in the During phase of the before-during-after model?
A. remediate
B. detect
C. scope
D. discover