In information security, ____ exists when a vulnerability known to an attacker is present.
A. threat
B. loss
C. risk
D. exposure
Answer: D
Computer Science & Information Technology
You might also like to view...
Which of the following tools, from Raw Logic, can be used to identify shared drives and folders on a Windows system?
A) NetCop B) NetBrute C) Nessus D) SAINT
Computer Science & Information Technology
Give a typedef statement that hides the pointer operator *. Call the new type identifier NodePtr.
Given the type definitions: ``` const int STRING_SIZE = 20; struct ListNode { char item[STRING_SIZE]; int count; ListNode *link; }; ListNode *head = new ListNode; ```
Computer Science & Information Technology