A potential weakness in an asset or its defensive control system(s) is known as a(n) __________.

A. threat
B. attackĀ 
C. exploit
D. vulnerability


Answer: D

Computer Science & Information Technology

You might also like to view...

For a higher level of security, ________ can be used to match unique characteristics to the user

A) passwords B) swipe card readers C) adaptive computer devices D) biometric devices

Computer Science & Information Technology

In Writer, the shortcut key ________ opens the File menu

Fill in the blank(s) with correct word

Computer Science & Information Technology

Removable media drives that plug into PnP interfaces, such as USB 2.0 or 3.0 or FireWire, should be recognized by the system as soon as they are connected to the port

Indicate whether the statement is true or false

Computer Science & Information Technology

The ________ component of Outlook is your e-mail address book for storing information about people, organizations, and businesses with whom you communicate.

a. Contacts b. Appointments c. Calendar d. E-mail

Computer Science & Information Technology