Watch this video on YouTube
To formalize its asset classification scheme, an information security team has been assigned the responsibility of identifying confidential data within the organization. The most pertinent input would be obtained from: