Which cybersecurity term is defined as the potential for an attack on a resource?
A. Impact
B. Vulnerability
C. Risk
D. Threat
Answer: D. Threat
Computer Science & Information Technology
You might also like to view...
Discuss the advantages and disadvantages of the three methods of converting to a new system: cold turkey cutover, phased cutover, and parallel operation cutover.
What will be an ideal response?
Computer Science & Information Technology
In what filesystem are most of the operating system files contained?
A. boot B. data C. mnt D. root
Computer Science & Information Technology