Which term refers to software that an attacker can use to compromise a system?
A. patch
B. vulnerability
C. virtualization
D. exploit
Answer: D. exploit
Business
You might also like to view...
When is a conditional receipt normally given to an applicant?
A) At the initial meeting B) When the initial premium is paid C) When coverage first becomes available D) At policy delivery"
Business
Two fundamental business strategies are ________
A) lowest cost and highest quality B) differentiation and turnaround C) lowest cost and differentiation D) lowest cost and turnaround
Business