Use of internally developed hardware or software by a department or individual with the knowledge of the organization's IT or security group
B.
Use of any technical workaround or software application without the knowledge of the organization's IT department
C.
Use of third-party technology systems, devices, software, applications, and services with IT department approval
Answer:
B
Question 3
After you create a business process by giving it a name and identifier and clicking "Create," what can you add to it?Note: There are 3 correct answers to this question.