Which of the following is done to ensure appropriate personnel have access to systems and networks? (Select TWO).
A.
Conduct periodic penetration testing assessments.
B.
Conduct periodic personnel employment verifications.
C.
Conduct rights review of users and groups.
D.
Conduct virus scan.
E.
Conduct vulnerability assessments.