A security analyst is tasked with compiling a report of all people who used a system between two dates. The thorough report must include information about how long and how often the system was used. Which information should the analyst ensure is in the report?
An organization’s leadership team gathered managers and key team members in each division to help create a disaster recovery plan. They realize they lack a complete understanding of the infrastructure and software needed to formulate the plan. Which action should they take to correct this issue?
Which risk relates to the removal of a person’s information within the public cloud by legal authorities?
Which term refers to taking an accurate account of a system's desired standard state so changes can be quickly detected for approval or remediation?