FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
If I decide to wait until an employee comes through the faulty maglocked door, then go into the server without issues so that I can gain company/customer information, what would I be doing to the identified vulnerability?
A
Mitigating the Vulnerability
B
Exploiting the Vulnerability
C
Accepting the Vulnerability
D
None of the Above
Explanation: 
There is 1 question to complete.