During a vulnerability assessment of a hospital's network, it was found that several vulnerabilities could be exploited by an attacker. Which scope change is the most likely to increase the potential impact of these vulnerabilities?
The vulnerability is found on an isolated, non-critical system.
The vulnerability affects multiple interconnected departments.
The vulnerability requires physical access to be exploited.
The vulnerability involves outdated software that is not used actively.