Westonci.ca connects you with experts who provide insightful answers to your questions. Join us today and start learning! Get immediate and reliable answers to your questions from a community of experienced experts on our platform. Get precise and detailed answers to your questions from a knowledgeable community of experts on our Q&A platform.

Question 10 (3.33 points)
Common methods of securing an IT system do NOT include
protecting data integrity by creating backups, entering and editing data correctly
protecting system integrity by using antimalware programs
setting permissions to restrict access
protecting data integrity by unblocking unauthorized access