Which of the following is performed during a security assessment?
A. Remediate the machines with incorrectly configured controls.
B. Quarantine the machines that have no controls in place.
C. Calculate the cost of bringing the controls back into compliance.
D. Determine the extent to which controls are implemented correctly
Answer: D