I T-241 Disc 4-2Security technologies can be grouped into two categories: proactive and reactive. Identify a real-world example of a proactive technology and an example of a reactive technology. Discu

I T-241 Disc 4-2Security technologies can be grouped into two categories: proactive and reactive. Identify a real-world example of a proactive technology and an example of a reactive technology. Discuss how they support an organization’s security posture. Identify any potential weaknesses.

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply