C clearly doesn't weaken the argument.
D says that it is possible for an external breaching...
since the source of this question is doubtful...i would suggest ignoring this question.
D says that it is possible for an external breaching...
since the source of this question is doubtful...i would suggest ignoring this question.




.jpg)

