An intentional or unintentional act that can damage or otherwise compromiseĀ information and the systems that support it is known as a(n) __________.

A. threat
B. attackĀ 
C. exploit
D. vulnerability

Answer: B

Computer Science & Information Technology

You might also like to view...

The second and subsequent fields you choose to sort by are called ________ fields

Fill in the blank(s) with correct word

Computer Science & Information Technology

A table inserted in a cell of an existing table is called a(n) ________ table

Fill in the blank(s) with correct word

Computer Science & Information Technology