A(n) ________ is a program that takes advantage of a(n)__________

A. vulnerability, risk
B. exploit, vulnerability
C. vulnerability, exploit
D. risk, exploit


B. exploit, vulnerability

Computer Science & Information Technology

You might also like to view...

Programming languages that use symbolic notation like ADD 1, 2 are referred to as ____.

a. assembly languages b. machine languages c. opcode languages d. IBM languages

Computer Science & Information Technology

Which protocol is responsible for determining the MAC address associated with each IP address and keeping a table of its results?

A. MAC B. DNS C. ARP D. NAT

Computer Science & Information Technology

In a lookup table, the number of the column which contains the return values is called the ________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

EX Case 4-1Zane is preparing his senior project for submission. He has kept all of the files for this project in an Excel workbook. He needs to edit it before turning it in. Zane has decided that he wants to rearrange the worksheets within the workbook. After clicking the Home tab, he will click the ____ button in the Cells group before selecting Move or Copy Sheet.

A. Format B. Insert C. Editing D. Delete

Computer Science & Information Technology