A(n) _____ is an attack that takes advantage of a vulnerability.

A. proxy
B. exploit
C. firewall
D. archive


Answer: B

Computer Science & Information Technology

You might also like to view...

_____ is a standard that spells out measures and security procedures to safeguard a card issuer, a cardholder, and a merchant.

A. Secure Sockets Layer (SSL) B. Card Verification Number C. Virtual private network (VPN) D. Payment Card Industry (PCI)

Computer Science & Information Technology

Lines, arrows, stars, banners, ovals, and rectangles are examples of ________ that are used to illustrate an idea, a process, or a workflow

A) clips B) shapes C) crops D) headers

Computer Science & Information Technology

The best use for linking text boxes is to create a:

A) Newsletter. B) Brochure. C) Flyer. D) Booklet.

Computer Science & Information Technology

Read the following sentence and key the correct terminal punctuation mark in the blank.You can cross the English Channel by ferry or by rail_____?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology