Which of the following best describes a threat exploiting a vulnerability?
A. Brute force
B. Risk
C. A hurricane
D. Power supply brownout
Answer: B. Risk
Computer Science & Information Technology
You might also like to view...
Text from another document can be inserted into a text content control
Indicate whether the statement is true or false
Computer Science & Information Technology
Word always displays both the current page number and total number of pages in the document on the ________
Fill in the blank(s) with correct word
Computer Science & Information Technology