• A to enable you to locate and act on resources that are associated with specific workloads, environments, business units, and owners
  • B to evaluate resources and make recommendations to help improve reliability and performance
  • C to manage policies that control or audit resources so that the configurations stay compliant with corporate standards
  • D to use several layers of protection to prevent information from being accessed by unauthorized users