I T-241 Disc 4-2Security technologies can be grouped into two categories: proactive and reactive. Identify a real-world example of a proactive technology and an example of a reactive technology. Discu
I T-241 Disc 4-2Security technologies can be grouped into two categories: proactive and reactive. Identify a real-world example of a proactive technology and an example of a reactive technology. Discuss how they support an organizations security posture. Identify any potential weaknesses.


Leave a Reply
Want to join the discussion?Feel free to contribute!