Which term refers to software that an attacker can use to compromise a system?

A. patch
B. vulnerability
C. virtualization
D. exploit

Answer: D. exploit

Business

You might also like to view...

When is a conditional receipt normally given to an applicant?

A) At the initial meeting B) When the initial premium is paid C) When coverage first becomes available D) At policy delivery"

Business

Two fundamental business strategies are ________

A) lowest cost and highest quality B) differentiation and turnaround C) lowest cost and differentiation D) lowest cost and turnaround

Business