question archive When considering "process vulnerabilities" employees who download outside applications to their office equipment without consulting with security administration is an example of: Select one: a
Subject:BusinessPrice:2.87 Bought7
When considering "process vulnerabilities" employees who download outside applications to their office equipment without consulting with security administration is an example of:
Select one:
a. Processes owned by service providers
b. Processes owned by designers-implementers
c. Processes owned by data owners
d. Processes owned by end users
Purchased 7 times