A small organization has implemented a rogue system detection solution. Which of the following BEST explains the organization’s intent?
A. To identify weak ciphers being used on the network
B. To identify assets on the network that are subject to resource exhaustion
C. To identify end-of-life systems still in use on the network
D. To identify assets that are not authorized for use on the network