Find trusted answers to your questions with the help of IDNLearn.com's knowledgeable community. Discover detailed answers to your questions with our extensive database of expert knowledge.

During a vulnerability scan, you discover some new systems in the network. After investigating this, you verify that these systems are not authorized because someone installed them without going through a standard approval process. What does this describe?