____ are defects in application and system software that can be exploited by a threat.

A. Threats
B. Vulnerabilities
C. Risks
D. Patches

Answer: B

Computer Science & Information Technology

You might also like to view...

Classes and methods are declared final for all but the following reasons:

a. final methods allow inlining the code. b. final methods and classes prevent further inheritance. c. final methods are static. d. final methods can improve performance.

Computer Science & Information Technology

If a computer's collating sequence places uppercase letters in consecutive ordinal positions, then

``` int('F') - int('A') ``` is ____________________. a. not defined b. 5 c. 4 d. 'B' e. 'D'

Computer Science & Information Technology