Ann, a security analyst, has discovered that her company has very high staff turnover and often user accounts
are not disabled after an employee leaves the company. Which of the following could Ann implement to help
identify accounts that are still active for terminated employees?
Routine audits are carried out after you have implemented security controls based on risk. These audits include
aspects such as user rights and permissions and specific events.