A threat analysis usually includes a description of the ____, or potential avenues of attack, that could allow the system to be exploited.

A. exploits
B. marks
C. command points
D. vulnerabilities

Answer: D

Computer Science & Information Technology

You might also like to view...

In font themes, the heading and body fonts are always different

Indicate whether the statement is true or false

Computer Science & Information Technology

Hexadecimal is also known as base 16

Indicate whether the statement is true or false

Computer Science & Information Technology