____ are defects in application and system software that can be exploited by a threat.
A. Threats
B. Vulnerabilities
C. Risks
D. Patches
Answer: B
Computer Science & Information Technology
You might also like to view...
After an object is instantiated and associated with a reference variable, how are the object's methods accessed? Give an example.
What will be an ideal response?
Computer Science & Information Technology
Javadoc requires a comment to be delimited by _________ to be included in the extracted class interface.
a. // // b. /* */ c. /** */ d. “ “
Computer Science & Information Technology
Sometimes your data will have a unique identifier that is already a part of your data. When that is true, you can use the field as a ________ key
A) foreign B) natural primary C) composite D) primary
Computer Science & Information Technology
Which of the following is a feature of change tracking?
A) E-mail changes B) Delete changes C) Add changes D) Highlight changes
Computer Science & Information Technology