liamaz9181 liamaz9181 15-01-2024 Computers and Technology contestada What activity is being performed when you apply security controls based on the specific needs of the IT system that they will be applied to? a. Standardizing b. Baselining c. Scoping d. Tailoring