Which of the following best describes a threat exploiting a vulnerability?

A. Brute force
B. Risk
C. A hurricane
D. Power supply brownout

Answer: B. Risk

Computer Science & Information Technology

You might also like to view...

Text from another document can be inserted into a text content control

Indicate whether the statement is true or false

Computer Science & Information Technology

Word always displays both the current page number and total number of pages in the document on the ________

Fill in the blank(s) with correct word

Computer Science & Information Technology