A(n) ________ is a program that takes advantage of a(n)__________
A. vulnerability, risk
B. exploit, vulnerability
C. vulnerability, exploit
D. risk, exploit
B. exploit, vulnerability
Computer Science & Information Technology
You might also like to view...
How would you make NIS user information override local user information on client systems?
What will be an ideal response?
Computer Science & Information Technology
What unique key is known only by the system and the person with whom the key is associated?
A. token B. user name C. user ID D. password
Computer Science & Information Technology
Microsoft's Office Presentation Service feature allows you to share your presentation ____ with anyone having an Internet connection.
A. uniquely B. immediately C. remotely D. secretly
Computer Science & Information Technology
When sending one email to everyone in your address book, you should use the ________ field to keep their addresses private.
A) To: B) Cc: C) Subject D) Bcc:
Computer Science & Information Technology