CRISC Certified in Risk and Information Systems Control – Question585

Which of the following would be considered a vulnerability?

A.
Delayed removal of employee access
B. Corruption of files due to malware
C. Authorized administrative access to HR files
D. Server downtime due to a denial of service (DoS) attack

Correct Answer: A