Which vulnerability follows the client in the vulnerability cycle?
A. application
B. human/organization
C. network
D. service/server
B
Explanation: The human/organization vulnerability follows the client in the vulnerability cycle.
The cycle includes the components in the following order, with the cycle returning to the beginning when it reaches the end:
• Client
• Human/organization
• Network
• Service/server
• Application
Computer Science & Information Technology
You might also like to view...
Identify the significance of "text" in
Computer Science & Information Technology
When presenting slides during a speaking engagement, presenters can run their slides ____, depending upon the audience's needs and comprehension.
A. chaotically B. nonsequentially C. in reverse order D. without verbal accompaniment
Computer Science & Information Technology