elrodkaitlynn1802 elrodkaitlynn1802 Today at 12:24 PM Computers and Technology Answered Which of the following vulnerabilities is most likely to be exploited by an external threat to the infrastructure? a) Insider threats b) Social engineering c) Unpatched software d) Weak authentication