As a best practice, the Security Assessment Report (SAR) should include which of the following sections?
A. Data classification policy
B. Software and hardware inventory
C. Remediation recommendations
D. Names of participants
A. Data classification policy
B. Software and hardware inventory
C. Remediation recommendations
D. Names of participants