72.Tyrone works for a financial services provider. He is told by the legal department that all records pertaining to certain types of data must be kept for a minimum of seven years. After talking with management about the requirements of the legal department, he agrees that a formal policy needs to be drafted to detail this information. Which of the following should Tyrone create? Hailey, a cybersecurity administrator, wants to simplify the administration of the routers and switches in her organization. When an employee leaves the company, she wants to automatically remove their access to log into the routers and switches by deactivating their main network accounts. Which of the following might she implement for authentication to meet this goal? Kim has been hired as a penetration tester for a large organization. He wants to see if he can gain access to one of the company's factories and identify any vulnerable technologies that the company might use. He also wants to see if he can gain access to any confidential or proprietary information. Which of the following might he employ to gain access to the factory? Jun, a cybersecurity analyst, has been tasked with making the organization's administration of user accounts and access to resources more efficient. Which of the following might he decide to implement to accomplish this goal? Pariah has just finished examining the NIST cybersecurity framework and is thinking about how her organization operates and the tools they use. Which of the following tools might she use in identifying services that are running and publicly exposed on the servers in her organization? a. Data retention policy b. Data classification policy c. Data watchdog policy d. Data ownership policy.