What is a way you can protect yourself against internal threats?
A. Keep an inventory of all equipment assigned to you
B. Do not install or use unauthorized software or hardware on the network
C. When possible, use physical locking devices for computing resources
D. Contact your supervisor or security personnel if you observe suspicious activity
E. All of the above