What is a flaw or weakness that allows a threat agent to bypass security?

A. risk
B. vulnerability
C. asset
D. threat


Answer: B

Computer Science & Information Technology

You might also like to view...

A ____ is a decorative edge on a photo or a portion of a photo.

a. resolution b. montage c. selection d. border

Computer Science & Information Technology

In a Hypertext Markup Language (HTML), the markers are codes that tell the browser how to format the text or graphics that will be displayed.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following is a component of a search engine?

A. Web crawler B. Indexer C. Query processor D. All of the above

Computer Science & Information Technology

Which of the following is the control when observing network bandwidth patterns over time?

A. Network log B. Baseline C. Flow data D. Interface statistics

Computer Science & Information Technology