An unlocked door is an example of a(n) ____.

A. vulnerability
B. threat
C. risk
D. exploit


Answer: A

Computer Science & Information Technology

You might also like to view...

When you drag a statement from the clipboard and drop it in the editing area, Alice copies the statement from the ____.

A. clipboard B. events C. details area D. object tree

Computer Science & Information Technology

List four different types of events.

What will be an ideal response?

Computer Science & Information Technology

Information stored on the Clipboard can include text, pictures, hyperlinks, and URLs

Indicate whether the statement is true or false

Computer Science & Information Technology

Which of the following uses copper wiring?

A) 1000BaseT B) 10GBaseER C) 100BaseFX D) 10GBaseLW

Computer Science & Information Technology