QuestionJuly 15, 2025

An adversary exploits a flaw in an older unpatched version of a piece of software, gaining access to confidential data they are not supposed to have permission for. This is an example of a A Vulnerability B Control C Threat D None of the other answer choices are correct

An adversary exploits a flaw in an older unpatched version of a piece of software, gaining access to confidential data they are not supposed to have permission for. This is an example of a A Vulnerability B Control C Threat D None of the other answer choices are correct
An adversary exploits a flaw in an older unpatched version of a piece of software, gaining access to confidential data they are not
supposed to have permission for. This is an example of a
A Vulnerability
B Control
C Threat
D None of the other answer choices are correct

Solution
4.3(316 votes)

Answer

A Vulnerability Explanation 1. Identify the scenario The adversary exploits a flaw in software to gain unauthorized access to data. 2. Define key terms A vulnerability is a flaw or weakness in a system that can be exploited. A threat is a potential cause of an unwanted incident. 3. Match scenario to definitions The scenario describes exploiting a flaw, which aligns with the definition of a vulnerability.

Explanation

1. Identify the scenario<br /> The adversary exploits a flaw in software to gain unauthorized access to data.<br /><br />2. Define key terms<br /> A vulnerability is a flaw or weakness in a system that can be exploited. A threat is a potential cause of an unwanted incident.<br /><br />3. Match scenario to definitions<br /> The scenario describes exploiting a flaw, which aligns with the definition of a vulnerability.
Click to rate:

Similar Questions