A cybersecurity analyst is completing an organization’s vulnerability report and wants it to reflect assets accurately.
Which of the following items should be in the report?
A . Processor utilization
B . Virtual hosts
C . Organizational governance
D . Log disposition
E . Asset isolation
Answer: B