an administrator goes through regular tasks every morning at the office to quickly gather health metrics of the network and associated systems. the admin connects to a windows jump server using a secure shell (ssh) to run health scripts which outputs the data to a .xls file on a local shared folder accessible to all employees. the most recent run of the health script failed immediately without any indication of the issue. if an information system security officer (isso) examined these morning tasks, what would be considered a weak configuration? (select all that apply.)