A weakness in a computer-based system that may be exploited to cause loss or harm is known as ?
(A) Vulnerability
(B) Attack
(C) Threat
(D) Exposure
Share this... |
![]() Facebook
|
![]() Twitter
|
![]() Linkedin
|
![]() Whatsapp
|
Your email address will not be published. Required fields are marked *