Which of the following is the MOST important step to conduct during a risk assessment of computing systems?
![PrepAway - Latest Free Exam Questions & Answers](https://www.briefmenow.org/img/pa5.jpg)
A.
The identification of USB drives
B.
The identification of missing patches
C.
The identification of mantraps
D.
The identification of disgruntled staff members