medium
Single Answer
0Which of the following tools is not typically used to verify that a provisioning process was followed in a way that ensures that the organization's security policy is being followed?
Answer Options
A
Log review
B
Manual review of permissions
C
Signature-based detection
D
Review the audit trail
Correct Answer: C
Explanation
While signature-based detection is used to detect attacks, review of provisioning processes typically involves checking logs, reviewing the audit trail, or performing a manual review of permissions granted during the provisioning process.