____ are defects in application and system software that can be exploited by a threat.
A. Threats
B. Vulnerabilities
C. Risks
D. Patches
Answer: B
Computer Science & Information Technology
You might also like to view...
Classes and methods are declared final for all but the following reasons:
a. final methods allow inlining the code. b. final methods and classes prevent further inheritance. c. final methods are static. d. final methods can improve performance.
Computer Science & Information Technology
If a computer's collating sequence places uppercase letters in consecutive ordinal positions, then
``` int('F') - int('A') ``` is ____________________. a. not defined b. 5 c. 4 d. 'B' e. 'D'
Computer Science & Information Technology