When assessing security risks it is required to evaluate each system for the following:
A . The current security protections in place
B . The requirements to protect the data
C . None of the above
D . All of the above
E . The complexity of the data stored or in transit
F . The sensitivity of the data stored or in transit
Answer: A,B,F