A cybersecurity analyst is completing an organization’s vulnerability report and wants it to reflect assets accurately. Which of the following items should be in the report?
A.
Processor utilization
B.
Virtual hosts
C.
Organizational governance
D.
Log disposition
E.
Asset isolation
Explanation: