A security administrator implements Secure Configuration Verification (SCV), because SCV: (Choose THREE.)
A(n) _______________ is an unintended communication path that can be used to violate a system security policy.
Which of the following is MOST likely to cause management to view a security-needs proposal as invalid?