A weakness in a computer-based system that may be exploited to cause loss or harm is known as ?
(A) Vulnerability
(B) Attack
(C) Threat
(D) Exposure
Share this... |
Facebook
|
Twitter
|
Linkedin
|
Whatsapp
|
Your email address will not be published. Required fields are marked *