Which of the following actions applies to a Risk Level of 1 Very Low?
A.
Can cause data leakage or malware infection without user knowledge
B.
Can bypass security or hide identities
C.
Potentially not business related
D.
Usually business related, with low risk