Which of the following refers to a piece of software, a tool, or a technique that targets or takes advantage of a vulnerability?
What will be an ideal response?
Exploit
Computer Science & Information Technology
You might also like to view...
A step to creating an outer join can involve drawing a join line between two tables in a query
Indicate whether the statement is true or false
Computer Science & Information Technology
A Vista feature that enables you to enter characters that don't have an assigned key on the keyboard is ________
Fill in the blank(s) with correct word
Computer Science & Information Technology