What is a flaw or weakness that allows a threat agent to bypass security?

A. risk
B. vulnerability
C. asset
D. threat

Answer: B

Computer Science & Information Technology

You might also like to view...

One of the most important parts of your work as an expert witness is ________ for the trial

Fill in the blank(s) with correct word

Computer Science & Information Technology

A saved Action file will have a(n) ____ extension.

A. ATN B. PNG C. ACT D. JPG

Computer Science & Information Technology