Isaca CISA Question Answer
An IS auditor is preparing for a review of controls associated with a manufacturing plant's implementation of industrial Internet of Things (loT) infrastructure Which of the following vulnerabilities would present the GREATEST security risk to the organization?