Stinkblowe8489 Stinkblowe8489 14-08-2020 Computers and Technology contestada A _______ is conducted to determine the adequacy of system controls, ensure compliance with established security policy and procedures, detect breaches in security services, and recommend any changes that are indicated for countermeasures.