What is the best statement for taking advantage of a weakness in the security of an ITm system?

Q. What is the best statement for taking advantage of a weakness in the security of an ITm system?
A. Threat
B. Attack
C. Exploit
D. Vulnerability
Answer: Exploit