Assets, Threats, and Vulnerabilities | Weekly challenge 3 Quiz |
Fill in the blank: All the potential vulnerabilities that a threat actor could exploit is called an attack _____.
- vector
- surface
- database
- network
Assets, Threats, and Vulnerabilities | Weekly challenge 3 Quiz |
Fill in the blank: All the potential vulnerabilities that a threat actor could exploit is called an attack _____.