What is the best statement for taking advantage of a weakness in the security of an ITm system?

Q. What is the best statement for taking advantage of a weakness in the security of an ITm system?

A. Threat

B. Attack

C. Exploit

D. Vulnerability

Answer: Exploit

We will be happy to hear your thoughts

Leave a reply

Gkseries.com
Logo
Register New Account