Which of the following reveals a system vulnerability and is often documented, either by the manufacturer or by an attacker?
A. hole
B. exploit
C. break-in
D. attack
Answer: B
Computer Science & Information Technology
You might also like to view...
If an assigned task is ____________________, it comes back to you.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
Which of the following is an example of presentation software?
A. Excel B. Access C. PowerPoint D. Word
Computer Science & Information Technology