zoesal9085 zoesal9085 Today at 7:33 AM SAT Answered Which of the following vulnerabilities is most likely to be exploited by an external threat to the infrastructure?