1.

Compromising confidential information comes under _________

A. a) bug
B. b) threat
C. c) vulnerability
D. d) attack
Answer» C. c) vulnerability


Discussion

No Comment Found