Which of the following persons is responsible for testing and verifying whether the security policy is properly implemented, and the derived security solutions are adequate or not?
A. Auditor
B. User
C. Data custodian
D. Data owner
A. Auditor
B. User
C. Data custodian
D. Data owner