Gkseries.com

What is the best statement for taking advantage of a weakness in the security of an ITm system?

What is the best statement for taking advantage of a weakness in the security of an ITm system?

Q. What is the best statement for taking advantage of a weakness in the security of an ITm system?

A.            Threat

B.            Attack

C.            Exploit

D.            Vulnerability

Answer: Exploit

Exit mobile version