Question 10 (3.33 points)
Common methods of securing an IT system do NOT include
protecting data integrity by creating backups, entering and editing data correctly
protecting system integrity by using antimalware programs
setting permissions to restrict access
protecting data integrity by unblocking unauthorized access