A(n) ________ is a program that takes advantage of a(n)__________

A. exploit, vulnerability
B. vulnerability, exploit
C. vulnerability, risk
D. risk, exploit


A. exploit, vulnerability

Computer Science & Information Technology

You might also like to view...

________ Top Row keeps only the top row visible as you scroll through a worksheet

Fill in the blank(s) with correct word

Computer Science & Information Technology

A consultant is looking to consolidate six company servers into one physical system. Which of the following requirements is most important on the new setup to ensure stable functionality of the virtual environment?

a. network resources b. server software security requirements c. server hardware resources d. client hardware requirements

Computer Science & Information Technology

Which of the following statements is false?

a. You can reuse a class many times to build many objects. b. The overhead of reusing classes instead of building new ones can discourage re-use. c. Reuse also helps you build more reliable and effective systems, because existing classes and components often have gone through extensive testing, debugging and performance tuning. d. Just as the notion of interchangeable parts was crucial to the Industrial Revolution, reusable classes are crucial to the software revolution that has been spurred by object technology.

Computer Science & Information Technology

Which of the following statements is false?

a) An exception indicates a problem that occurs while a program executes. b) Exception handling helps you create fault-tolerant programs. c) When an exception is handled, the program continues executing as if no problem was encountered. d) The compiler does not detect exceptions.

Computer Science & Information Technology