Answer:
The possible monitoring vulnerability in this case will be as follows:
• No division of service
• Too much dependence on the individual
• credibility and location of information, if any, are questionable
• The measurement errors are high
Throughout such a situation, the programme would be configured to include end-users as well as GL offices with a comprehensive checklist of journal coupons and accounts operation records throughout order to prepare for the possible harm.