Which of the following would be considered a vulnerability?

A. installation of a firewall
B. antivirus software
C. Internet-connected computer
D. spyware

Answer: C

Computer Science & Information Technology

You might also like to view...

A business manager who wants to create a database with unique specifications should not use Access because Access only offers generic database templates

Indicate whether the statement is true or false

Computer Science & Information Technology

________ are reentrant interrupt handlers.

a) Softirqs b) Tasklets c) top half interrupt handlers d) none of the above

Computer Science & Information Technology