Which of the following activities may be part of establishing security controls? Select three answers.
a. Collect and analyze security data regularly
b. Monitor and record user requests
c. Evaluate whether current controls help achieve business goals
d. Implement multi-factor authentication