Which cybersecurity term is defined as the potential for an attack on a resource?

A. Impact
B. Vulnerability
C. Risk
D. Threat

Answer: D. Threat

Computer Science & Information Technology

You might also like to view...

Discuss the advantages and disadvantages of the three methods of converting to a new system: cold turkey cutover, phased cutover, and parallel operation cutover.

What will be an ideal response?

Computer Science & Information Technology

In what filesystem are most of the operating system files contained?

A. boot B. data C. mnt D. root

Computer Science & Information Technology