medium
Single Answer
0

Which of the following tools is not typically used to verify that a provisioning process was followed in a way that ensures that the organization's security policy is being followed?

Answer Options

A

Log review

B

Manual review of permissions

C

Signature-based detection

D

Review the audit trail

Correct Answer: C

Explanation

While signature-based detection is used to detect attacks, review of provisioning processes typically involves checking logs, reviewing the audit trail, or performing a manual review of permissions granted during the provisioning process.