Match the example given to the correct type of vulnerability that exists to IT assets or processes.Question 8 options:3The systems administrator does not regularly run software updates to the operating system.1People that have no reason to be in the server room are able to get into the room at any time.3There is no training for employees about what social engineering is and how they can identify attacks using social engineering.1The server room in the building is located directly below the bathroom where there are regular problems with the plumbing.1Protective equipment not installed in a server room to keep the servers from overheating and malfunctioning.2The firewall and antivirus software used by the company is outdated.1Management does not treat employees well so there is very low employee moral in the company.1.This vulnerability exists within the Physical IT Environment.2.This vulnerability exists within the Information System.3.This vulnerability exists within the Processes of IT Operations.Match the example given to the correct type of vulnerability that exists to IT assets or processes.Question 8 options:3The systems administrator does not regularly run software updates to the operating system.1People that have no reason to be in the server room are able to get into the room at any time.3There is no training for employees about what social engineering is and how they can identify attacks using social engineering.1The server room in the building is located directly below the bathroom where there are regular problems with the plumbing.1Protective equipment not installed in a server room to keep the servers from overheating and malfunctioning.2The firewall and antivirus software used by the company is outdated.1Management does not treat employees well so there is very low employee moral in the company.1.This vulnerability exists within the Physical IT Environment.2.This vulnerability exists within the Information System.