List of questions
Related questions
Question 5 - IT Risk Fundamentals discussion
Which of the following is considered an exploit event?
A.
An attacker takes advantage of a vulnerability
B.
Any event that is verified as a security breach
C.
The actual occurrence of an adverse event
Your answer:
0 comments
Sorted by
Leave a comment first