• A Allowing all users full administrative privileges
  • B Using the least privilege principle for users
  • C Storing sensitive data in plain text format for easy access
  • D Relying solely on user passwords for protection