chalolomarie6557 chalolomarie6557
  • 20-12-2021
  • Computers and Technology
contestada

A weakness of a system, process, or architecture that could lead to compromised information or unauthorized access is known as a/an ____ .

Respuesta :

laurynlittle528
laurynlittle528 laurynlittle528
  • 20-12-2021

Answer: vulnerability

Explanation:

Answer Link

Otras preguntas

In the coordinate plane shown, how far apart are points B and D? Explain how you can use the Pythagorean theorem to determine this.
Need Help Choose All That Apply
In 1973, why did Egypt and Syria attack Israel, starting the Yom Kippur War? A. They were trying to free the Palestinians from Israeli rule. B. They wante
PLEASE HELP! WILL GIVE BRAINLIEST!!! Which expression is equivalent to [tex](p^{10}r^{-5})\frac{1}{5}[/tex]? ​ A. 1pr ​ ​B. 1p2r ​ C.​ p2r​ D.​ p2r ​
how do you convert 1357 inches into miles?
If 2/3 of the 600 seeds sprouted, how many seeds did not sprout?
To be certain that contamination from raw meats to other food or surfaces does not happen in a kitchen a good practice would be to _______.
there are 657 lights on you set. on any given day 6 of them burn out and need to be replaced . if each light cost $45 how much do you spend replacing them each
Writing a professional messages involves thinking and planning.
Why was Babylon an important city in the ancient world? I’m not really sure what the answer is. Please help!