A(n) ________ is a program that takes advantage of a(n)__________

A. vulnerability, risk
B. exploit, vulnerability
C. vulnerability, exploit
D. risk, exploit


B. exploit, vulnerability

Computer Science & Information Technology

You might also like to view...

How would you make NIS user information override local user information on client systems?

What will be an ideal response?

Computer Science & Information Technology

What unique key is known only by the system and the person with whom the key is associated?

A. token B. user name C. user ID D. password

Computer Science & Information Technology

Microsoft's Office Presentation Service feature allows you to share your presentation ____ with anyone having an Internet connection.

A. uniquely B. immediately C. remotely D. secretly

Computer Science & Information Technology

When sending one email to everyone in your address book, you should use the ________ field to keep their addresses private.

A) To: B) Cc: C) Subject D) Bcc:

Computer Science & Information Technology