Which of the following actions applies to a Risk Level of 2 Low?
A.
Potentially not business related
B.
Can bypass security or hide identities
C.
Can be misused and cause data leakage or malware infection
D.
Can cause data leakage or malware infection without user knowledge