A threat analysis usually includes a description of the ____, or potential avenues of attack, that could allow the system to be exploited.
A. exploits
B. marks
C. command points
D. vulnerabilities
Answer: D
Computer Science & Information Technology