Which option is a weakness in an information system that an attacker might leverage to gain unauthorized access to the system or its data?
Which option is a weakness in an information system that an attacker might leverage to gain unauthorized access to the system or its data?
A . hack
B . mitigation
C . risk
D . vulnerability
E . exploit
Answer: D
Explanation:
vulnerability A flaw or weakness in a system’s design or implementation that could be exploited.
Latest 210-260 Dumps Valid Version with 498 Q&As
Latest And Valid Q&A | Instant Download | Once Fail, Full Refund
Subscribe
Login
0 Comments
Inline Feedbacks
View all comments