Which of the following is the MOST important step to conduct during a risk assessment of computing systems?
A.
The identification of USB drives
B.
The identification of missing patches
C.
The identification of mantraps
D.
The identification of disgruntled staff members