A flaw or weakness in a system’s design, implementation, or operation and management that could be exploited to violate the system’s security policy is a(n) __________.A flaw or weakness in a system’s design, implementation, or operation and management that could be exploited to violate the system’s security policy is a(n) __________.

A. countermeasure B. vulnerability

C. adversary D. risk

B. vulnerability

Computer Science & Information Technology

You might also like to view...

Which of the following is the default port for telnet?

A. 21 B. 23 C. 20 D. 22

Computer Science & Information Technology

A ____ Exception occurs when code attempts to divide a number by zero.

A. Divide by Zero B. Zero denominator C. Zero error D. Division Error

Computer Science & Information Technology