In a well-controlled environment, which of the following activities is MOST likely to lead to the introduction of weaknesses in security software?
A. Applying patches
B. Changing access rules
C. Upgrading hardware
D. Backing up files
A. Applying patches
B. Changing access rules
C. Upgrading hardware
D. Backing up files