Which of the following would be expected from a security consultant who has been hired to investigate a data breach of a private cloud instance?
A. Incident report
B. Application scan results
C. Request for information
D. Risk register
A. Incident report
B. Application scan results
C. Request for information
D. Risk register