Which of the following examples represents a misconfiguration scenario that could lead to security vulnerabilities?
A system regularly receives updates to its antivirus definitions.
All desktop computers in an office have the latest operating system patches installed.
A server is configured with the manufacturer's default username and password for administrative access.
A web application is using HTTPS instead of HTTP to encrypt its traffic.