What is a key mitigation strategy to address logging and monitoring failures, ensuring that critical security events are captured and analyzed effectively?
A. Implementing strong encryption techniques
B. Enforcing strict access controls
C. Performing penetration testing regularly
D. None of the choices
E. Regularly updating software patche
F. Utilizing anomaly detection systems