A technique used to compromise a system is known as a(n) __________.

A. threat
B. attackĀ 
C. exploit
D. vulnerability


Answer: C

Computer Science & Information Technology

You might also like to view...

802.11 wireless networks exist as ____ on nearly all large networks.

A. subnets B. tunnels C. ports D. rings

Computer Science & Information Technology

To create a crosstab query using fields from more than one table, the user must create a select query with the fields from both tables and then use the query as the data source for the crosstab query

Indicate whether the statement is true or false

Computer Science & Information Technology

Typing a new list after starting the mail merge process is one method for getting the variable information that will be inserted into a main document

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the followingObjectconstructor methods defines or modifies the property,prop, for the object,obj; wheredescriptordescribes the property.

A. obj.defineProperty(object, prop,descriptor) B. prop.defineProperty(object,descriptor)) C. Object.defineProperty(obj, prop,descriptor) D. Object.descriptor(obj, property)

Computer Science & Information Technology