Which option is the term for what happens when computer code is developed to take advantage of a vulnerability? For example, suppose that a vulnerability exists in a piece of software, but nobody knows about this vulnerability.
|
A vulnerability
|
|
An exploit
|
|
A risk
|
|
An attack
|