Fill in the blank: All the potential vulnerabilities that a threat actor could exploit is called an attack _____.

Assets, Threats, and Vulnerabilities | Weekly challenge 3 Quiz | 

Fill in the blank: All the potential vulnerabilities that a threat actor could exploit is called an attack _____.

  • vector
  • surface
  • database
  • network

 

Leave a Comment