From the options below, which of them is not a vulnerability to information security?
(a) flood
(b) without deleting data, disposal of storage media
(c) unchanged default password
(d) latest patches and updates not done
The question was asked during an internship interview.
This question is from Information Security Technologies in division Cyber Security of Cyber Security