Which option is a weakness in an information system that an attacker might leverage to gain unauthorized access to the system or its data?

Which option is a weakness in an information system that an attacker might leverage to gain unauthorized access to the system or its data?
A . hack
B . mitigation
C . risk
D . vulnerability
E . exploit

Answer: D

Explanation:

vulnerability A flaw or weakness in a system’s design or implementation that could be exploited.

Latest 210-260 Dumps Valid Version with 498 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments