What is the best statement for taking advantage of a weakness in the security of an ITm system?
Q. What is the best statement for taking advantage of a weakness in the security of an ITm system?
A. Threat
B. Attack
C. Exploit
D. Vulnerability
Answer: Exploit