Sovi.AI - AI Math Tutor

Scan to solve math questions

QUESTION IMAGE

the triad of computing security includes which of the following? a. det…

Question

the triad of computing security includes which of the following?
a. detection, response, and monitoring
b. vulnerability assessment, detection, and monitoring
c. vulnerability/threat assessment and risk management, network intrusion detection and incident response, and digital investigation
d. vulnerability assessment, intrusion response, and monitoring

Explanation:

Brief Explanations

The core triad of computing security operations centers on three key functional areas: proactive risk and threat evaluation, real-time threat detection and incident response, and post-incident digital investigation to understand and mitigate future risks. The other options only cover partial or operational sub-tasks rather than the full triad.

Answer:

c. Vulnerability/threat assessment and risk management, network intrusion detection and incident response, and digital investigation