A security administrator is struggling to prioritize vulnerability remediation due to resource constraints.
Which of the following may inhibit the security administrator's task?
A. Inappropriate data classifications
B. SLAs with the supporting vendor
C. Business process interruption
D. Required sandbox testing
E. Incomplete asset inventory