In information security, ____ exists when a vulnerability known to an attacker is present.

A. threat
B. loss
C. risk
D. exposure

Answer: D

Computer Science & Information Technology

You might also like to view...

Which of the following tools, from Raw Logic, can be used to identify shared drives and folders on a Windows system?

A) NetCop B) NetBrute C) Nessus D) SAINT

Computer Science & Information Technology

Give a typedef statement that hides the pointer operator *. Call the new type identifier NodePtr.

Given the type definitions: ``` const int STRING_SIZE = 20; struct ListNode { char item[STRING_SIZE]; int count; ListNode *link; }; ListNode *head = new ListNode; ```

Computer Science & Information Technology