A _________would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a ___________is a combination of the likelihood that such a misconfiguration could happen, a hacker's exploitation of it and the impact if the event occurred.
a. Vulnerability, risk
b. Build, acquire, and implement
c. Deliver, service, and support
d. Evaluate, assess, and perform
Answers
Answered by
0
a. Vulnerability , risk
Similar questions
English,
7 months ago
History,
7 months ago
Political Science,
7 months ago
Social Sciences,
1 year ago
Biology,
1 year ago