What is the best statement for taking advantage of a weakness in the security of an ITm system?

Q. What is the best statement for taking advantage of a weakness in the security of an ITm system?

A.            Threat

B.            Attack

C.            Exploit

D.            Vulnerability

Answer: Exploit

We will be happy to hear your thoughts

Leave a reply

Gkseries.com
Logo
Register New Account