Which of the following is most likely associated with introducing vulnerabilities on a corporate network by the deployment of unapproved software?
A. Hacktivists
B. Script kiddies
C. Competitors
D. Shadow IT
A. Hacktivists
B. Script kiddies
C. Competitors
D. Shadow IT