A bespoke application used by your company has been the target of malware. The developers have created signatures for th
Posted: Mon Jul 11, 2022 9:54 am
company has been the target of malware. The developers have created signatures for the application's binaries, and these have been added to endpoint detection and response (EDR) scanning software running on each workstation. If a scan shows that a binary image no longer matches its signature, an administrative alert is generated. What type of security control is this? O A. Auditing Control OB. Technical Control O C. Detective Control O D. Managerial Control
A bespoke application used by your