Watch this video on YouTube
When examining print systems spooling, what vulnerabilities are of greatest concern to an IS auditor?