Which of the following is the BEST way for information security manager to identify compliance with information security policies within an organization?
A . Analyze system logs.
B . Conduct security awareness testing.
C . Perform vulnerability assessments.
D . Conduct periodic audits.
Answer: D