The answer is the first choice. Those with OCD do not think about harming one they love because of the disorder.
Audit
The act of recording noteworthy security events that transpire on a network or computing device is known as an audit.
The act of mapping and inventorying your network's hardware and software is known as network auditing. Identifying network components manually is a fairly difficult undertaking. Network auditing tools may occasionally be able to automate the process of identifying the network-connected devices and services. Auditing should cover security records such user accounts, groups, and permissions in addition to hardware and software.
Network security plays an exceptionally large role in the auditing process. Some clients may choose to briefly touch on cybersecurity while others create detailed project scopes entirely on the subject.
To know more about Network auditing here
brainly.com/question/28084850
#SPJ4
I have no clue who that is sorry
Genwjshsvebjroejsvr tkdidnebsvekgonsbdlfnwgsifkrvej
Answer:
I think it is the author because there is no exact points of view like "me sir jason" it does not say that so I think the author is the one telling the tell
Explanation: