______ is a weakness in a product that could allow an attacker to compromise the integrity, availability, or confidentiality of that product.
a. Security vulnerability
b. Cyber security
c. Computer virus
d. Cyber attack
a. Security vulnerability
You might also like to view...
The judicial selection process has been said to be very:
A) unorganized. B) corrupt. C) quick. D) political.
Which of the following takes place when the body requires larger and larger dosages of the substance to experience the desired effect?
a. withdrawl syndrome b. psychological dependence c. addiction d. tolerance
Who among the following is NOT a part of the courtroom workgroup?
A. The defense attorney B. The police officer C. The judge D. The prosecutor
Which of the following would not be an example of technocrime?
a. Hijacking large shipments of electronic equipment b. Automatic teller machine fraud c. Airwave piracy d. Unauthorized use of corporate switchboards