____ are defects in application and system software that can be exploited by a threat.

A. Threats
B. Vulnerabilities
C. Risks
D. Patches


Answer: B

Computer Science & Information Technology

You might also like to view...

After an object is instantiated and associated with a reference variable, how are the object's methods accessed? Give an example.

What will be an ideal response?

Computer Science & Information Technology

Javadoc requires a comment to be delimited by _________ to be included in the extracted class interface.

a. // // b. /* */ c. /** */ d. “ “

Computer Science & Information Technology

Sometimes your data will have a unique identifier that is already a part of your data. When that is true, you can use the field as a ________ key

A) foreign B) natural primary C) composite D) primary

Computer Science & Information Technology

Which of the following is a feature of change tracking?

A) E-mail changes B) Delete changes C) Add changes D) Highlight changes

Computer Science & Information Technology