A technique used to compromise a system is known as a(n) __________.
A. threat
B. attackĀ
C. exploit
D. vulnerability
Answer: C
Computer Science & Information Technology
You might also like to view...
In the Slide Size dialog box, the two orientation options are landscape and ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
Which Cisco IOS command is used to configure a specific interface to be included in the OSPFv3 routing process?
A) network ipv6-prefix/ipv6-prefix-length area area-id B) ipv6 ospfv3 process-id area area-id C) ipv6 ospf process-id area area-id D) network ipv6-prefix/ipv6-prefix-length
Computer Science & Information Technology