Automated mechanisms exist to enforce host containment protections that revoke or quarantine a host’s access to the network.
Does the organization use automated mechanisms to enforce host containment protections that revoke or quarantine a host’s access to the network?