What is the best statement for taking advantage of a weakness in the security of an ITm system? HomeCyber Security & Cyber Crime MCQsWhat is the best statement for taking advantage of a weakness in the security of an ITm system?Q. What is the best statement for taking advantage of a weakness in the security of an ITm system?A. ThreatB. AttackC. ExploitD. VulnerabilityAnswer: Exploit