Which of the following is done to ensure appropriate personnel have access to systems and networks? (Select TWO)