Which of the following refers to a piece of software, a tool, or a technique that targets or takes advantage of a vulnerability?

What will be an ideal response?

Exploit

Computer Science & Information Technology

You might also like to view...

A step to creating an outer join can involve drawing a join line between two tables in a query

Indicate whether the statement is true or false

Computer Science & Information Technology

A Vista feature that enables you to enter characters that don't have an assigned key on the keyboard is ________

Fill in the blank(s) with correct word

Computer Science & Information Technology