Answer:
More people are interested in information security, and have developed the skills to find new vulnerabilities.
Explanation:
In the past, few people are interested in information security due to the fact that, it was a new field that was not exploited then. This create an ample opportunity for the windows vulnerability for hackers. Currently, due to increasing interest in information technology, the vulnerability of windows are shrinking.
<u>Effective use of logistics management techniques</u> is an example of a capability that is based in the functional area of distribution.
<u>Option: C</u>
<u>Explanation:</u>
An aspect of supply chain management that is utilized to fulfill consumer expectations by planning, monitoring and enforcing the efficient transportation and storage of relevant information, goods and services from source to destination, thus understood as a logistic management.
This is accompanied by a logistics approach that is a collection of guiding principles, attitudes and driving forces that will help you manage plans, priorities and initiatives through any supply chain among different partners. It allows companies to increase performance in the supply chain while enhancing supply chain management overall.