What is a flaw or weakness that allows a threat agent to bypass security?
A. risk
B. vulnerability
C. asset
D. threat
Answer: B
Computer Science & Information Technology
You might also like to view...
A ____ is a decorative edge on a photo or a portion of a photo.
a. resolution b. montage c. selection d. border
Computer Science & Information Technology
In a Hypertext Markup Language (HTML), the markers are codes that tell the browser how to format the text or graphics that will be displayed.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Which of the following is a component of a search engine?
A. Web crawler B. Indexer C. Query processor D. All of the above
Computer Science & Information Technology
Which of the following is the control when observing network bandwidth patterns over time?
A. Network log B. Baseline C. Flow data D. Interface statistics
Computer Science & Information Technology