An intentional or unintentional act that can damage or otherwise compromiseĀ information and the systems that support it is known as a(n) __________.
A. threat
B. attackĀ
C. exploit
D. vulnerability
Answer: B
Computer Science & Information Technology
You might also like to view...
The second and subsequent fields you choose to sort by are called ________ fields
Fill in the blank(s) with correct word
Computer Science & Information Technology
A table inserted in a cell of an existing table is called a(n) ________ table
Fill in the blank(s) with correct word
Computer Science & Information Technology