__________ provides a snapshot of threats over time, encouraging the maintenance of up-to-date situational awareness. Network monitoring Threat analysis Vulnerability Scanning Endpoint activity monitoring
Endpoint activity monitoring