Question: Vulnerability, threat, risk, and exposure are _ _ _ _ _ _ _ _ _ _ _ _ . Question 6 options: weaknesses that must
Vulnerability, threat, risk, and exposure are
Question options:
weaknesses that must be removed from systems and software.
potential dangers which could cause loss of confidentiality
potential dangers which will cause loss of availability.
terms that are incorrectly treated as having the same meaning
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
