A flaw or weakness in a system’s design, implementation, or operation and management that could be exploited to violate the system’s security policy is a(n) __________.A flaw or weakness in a system’s design, implementation, or operation and management that could be exploited to violate the system’s security policy is a(n) __________.
A. countermeasure B. vulnerability
C. adversary D. risk
B. vulnerability
Computer Science & Information Technology
You might also like to view...
Which of the following is the default port for telnet?
A. 21 B. 23 C. 20 D. 22
Computer Science & Information Technology
A ____ Exception occurs when code attempts to divide a number by zero.
A. Divide by Zero B. Zero denominator C. Zero error D. Division Error
Computer Science & Information Technology