Experience the power of community-driven knowledge on IDNLearn.com. Ask anything and receive prompt, well-informed answers from our community of knowledgeable experts.

Which of the following activities may be part of establishing security controls? Select three answers.
a. Collect and analyze security data regularly
b. Monitor and record user requests
c. Evaluate whether current controls help achieve business goals
d. Implement multi-factor authentication