In information security, ____ exists when a vulnerability known to an attacker is present.

A. threat
B. loss
C. risk
D. exposure


Answer: D

Computer Science & Information Technology

You might also like to view...

Given the following code snippet, what will be displayed on the web page if the user enters 4 at the prompt?

``` var myNum = prompt("Enter a number:"); var result = myNum + myNum; document.write(result); ``` a. 44 b. 8 c. NaN d. 4 4

Computer Science & Information Technology

You use a(n) ________ program to view information on the World Wide Web

Fill in the blank(s) with correct word

Computer Science & Information Technology

With Microsoft Project 2010, all risk associated with a project can be eliminated.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The transfer of live transactions in real time to an off-site facility is called ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology