During a vulnerability assessment of a hospital's network, it was found that several vulnerabilities could be exploited by an attacker. Which scope change is the most likely to increase the potential impact of these vulnerabilities?
The vulnerability involves outdated software that is not used actively.
The vulnerability affects multiple interconnected departments.
The vulnerability requires physical access to be exploited.
The vulnerability is found on an isolated, non-critical system.