A technique used to compromise a system is known as a(n) __________.

A. threat
B. attackĀ 
C. exploit
D. vulnerability

Answer: C

Computer Science & Information Technology

You might also like to view...

In the Slide Size dialog box, the two orientation options are landscape and ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which Cisco IOS command is used to configure a specific interface to be included in the OSPFv3 routing process?

A) network ipv6-prefix/ipv6-prefix-length area area-id B) ipv6 ospfv3 process-id area area-id C) ipv6 ospf process-id area area-id D) network ipv6-prefix/ipv6-prefix-length

Computer Science & Information Technology