A _____ is a security weakness or soft spot.

A. proxy
B. vulnerability
C. firewall
D. malware


Answer: B

Computer Science & Information Technology

You might also like to view...

The number of frames shown in each unit of video is expressed as ____.

A. MHz B. GHz C. fz D. fps

Computer Science & Information Technology

You can select up to ________ for row headings in a crosstab query

A) three fields B) eight fields C) five fields D) three records

Computer Science & Information Technology

PowerPoint's ________ feature enables you to type your initials and have them them replaced by your full name; for example, tn becomes Tom Norton

A) AutoCorrect B) AutoComplete C) AutoReplace D) AutoFill

Computer Science & Information Technology

The margin settings of a document are noted on the horizontal and vertical ____ by the blue-shaded measurements.

A. ribbons B. rulers C. tab indicators D. indent markers

Computer Science & Information Technology