COMPUTER THREATS SECURITY
TYPES OF COMPUTER SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
If I decide to wait until an employee comes through the faulty maglocked door, then go into the server without issues so that I can gain company/customer information, what would I be doing to the identified vulnerability?
|
Mitigating the Vulnerability
|
|
Exploiting the Vulnerability
|
|
Accepting the Vulnerability
|
|
None of the Above
|
Explanation:
There is 1 question to complete.