Which option is the term for what happens when computer code is developed to take advantage of a vulnerability? For example, suppose that a vulnerability exists in a piece of software, but nobody knows about this vulnerability.
An exploit
A vulnerability
A risk
An attack
CCNA Practice Tests
Privacy Policy