Multiple Choice
A(n) __________ is the probability of a threat exploiting a vulnerability.
A) threat
B) risk
C) vulnerability
D) exploit
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q64: A majority of data breaches involve some
Q65: Today,infosec is mostly a technology issue assigned
Q66: Fingerprints,retinal scans,and voice scans for user identification
Q67: A _ attack occurs when a server
Q68: Who stole account data from HSBC's Private
Q69: Sarbanes-Oxley Act is an antifraud law.It forces
Q70: IT risk management includes all of the
Q71: Protecting data and business operations involves all
Q72: All of the following are characteristics of
Q74: Newly released viruses with unidentified signatures or