✅ The verified answer to this question is available below. Our community-reviewed solutions help you understand the material better.
An organization relies heavily on external software vendors. After a breach investigation, it is discovered that attackers entered the system through a trusted partner’s compromised update. What security weakness MOST enabled this attack?