What is a Service-level agreement (SLA) primarily used for in the context of cybersecurity vulnerability management?
D - Keeping track of all the hardware and software inventory in the organization
C - Directly reducing the time it takes to respond to and resolve cybersecurity incidents
B - Defining the expected service level, including responsiveness and resolution times, between the cybersecurity team and the organization
A - Providing a detailed report of identified vulnerabilities and their potential impact