Welcome to Westonci.ca, your go-to destination for finding answers to all your questions. Join our expert community today! Join our Q&A platform to get precise answers from experts in diverse fields and enhance your understanding. Get quick and reliable solutions to your questions from a community of experienced experts on our platform.

Question 10 (3.33 points)
Common methods of securing an IT system do NOT include
protecting data integrity by creating backups, entering and editing data correctly
protecting system integrity by using antimalware programs
setting permissions to restrict access
protecting data integrity by unblocking unauthorized access