Which of the following reveals a system vulnerability and is often documented, either by the manufacturer or by an attacker?

A. hole
B. exploit
C. break-in
D. attack

Answer: B

Computer Science & Information Technology

You might also like to view...

If an assigned task is ____________________, it comes back to you.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following is an example of presentation software?

A. Excel B. Access C. PowerPoint D. Word

Computer Science & Information Technology