contestada

What is the best statement for taking advantage of a weakness in the security of an IT system?
a. Vulnerability
b. Threat
c. Attack
d. Exploit