What is a flaw or weakness that allows a threat agent to bypass security?
A. risk
B. vulnerability
C. asset
D. threat
Answer: B
Computer Science & Information Technology
You might also like to view...
One of the most important parts of your work as an expert witness is ________ for the trial
Fill in the blank(s) with correct word
Computer Science & Information Technology
A saved Action file will have a(n) ____ extension.
A. ATN B. PNG C. ACT D. JPG
Computer Science & Information Technology