
Ultimate access to all questions.
In the context of protecting against insider threats, external attacks, and supply chain attacks, outline a comprehensive cybersecurity strategy that aligns with best practices. Consider the various stages of the attack lifecycle and how your strategy would mitigate risks at each stage.
A
Implement strict access controls and regular security audits.
B
Use advanced threat detection tools and conduct regular employee training.
C
Focus solely on securing the perimeter and ignore internal vulnerabilities.
D
Rely on traditional antivirus software and ignore modern attack vectors.