Which of the following areas is MOST susceptible to the introduction of security weaknesses?
A. Database management
B. Tape backup management
C. Configuration management
D. Incident response management
A. Database management
B. Tape backup management
C. Configuration management
D. Incident response management