The IT department at a growing law firm wants to begin using a third-party vendor for vulnerability monitoring and mitigation. The executive director of the law firm wishes to outline the assumptions and expectations between the two companies.
Which of the following documents might be referenced in the event of a security breach at the law firm?
A . SLA
B . MOU
C . SOW
D . NDA
Answer: A