A vulnerability exists when:

A) Friendly forces detect a weakness in their operations.
B) Friendly forces detect a weakness in their operations and when the adversary is capable of collecting critical information, correctly analyzing it, and then taking timely action.
C) The adversary is capable of detecting critical information.
D) The adversary is able to collect friendly critical information.
E) The adversary is capable of collecting critical information, correctly analyzing it, and then taking timely action.

Respuesta :

Answer:

E) The adversary is capable of collecting critical information, correctly analyzing it, and then taking timely action

Explanation:

The above is a case of military vulnerability invariably termed critical vulnerability. Critical vulnerability is an aspect of a critical requirement which has some deficiency and is vulnerable to direct or indirect attack that will create decisive or significant effects such as analysis of secret information and timely action as illustrated here

ACCESS MORE
EDU ACCESS