A complete and comprehensive security approach needs to address or perform two main functions. The first is to secure assets and the second is:
A. Watch for violation attempts.
B. Prevent downtime.
C. Verify identity.
D. Control access to resources.
E. Design the infrastructure based on the organization's mission.
Answer: A