Answer:
Step-by-step explanation:
Selection 1: b. Integrity problems leading to harmful output or action.
Selection 2: c. Opportunity for Exploitation by a malicious actor.
9.4m questions
12.2m answers