Which of the following is described as a practice where a variety of tools and applications are used to automatically detect, and alert, to suspected security concerns?A. Continuous monitoringB. Automated monitoringC. Continuous validationD. Secure automation