Computer Science, asked by kasarlarajiv2069, 1 year ago

A _________would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a ___________is a combination of the likelihood that such a misconfiguration could happen, a hacker's exploitation of it and the impact if the event occurred.

a. Vulnerability, risk

b. Build, acquire, and implement

c. Deliver, service, and support

d. Evaluate, assess, and perform

Answers

Answered by Swapnalalichan
0
a. Vulnerability , risk
Similar questions