Which of the following actions is most likely to grant unauthorized individuals the ability to access sensitive information in a computer system?
Which of the following actions is most likely to grant unauthorized individuals the ability to access sensitive information in a computer system?