A(n) _________ is a weakness in an asset or group of assets that can be exploited by one or more threats.

Fill in the blank(s) with the appropriate word(s).

vulnerability

Computer Science & Information Technology

You might also like to view...

The image element is NOT a self-closing tag

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following is a protocol used for VoIP call setup and teardown?

A. SPF B. STP C. SIP D. SSL

Computer Science & Information Technology