The answers are NOT vulnerabilities. They are logical and physical threats. A vulnerability is a coding or config error. Viruses use EXPLOITS to leverage vulnerabilities. Theft, well, I have no idea. I would say Unauthorized downloads and file permissions would be a better answer.
The answers are NOT vulnerabilities. They are logical and physical threats. A vulnerability is a coding or config error. Viruses use EXPLOITS to leverage vulnerabilities. Theft, well, I have no idea. I would say Unauthorized downloads and file permissions would be a better answer.
0
0
Well, they’re not. So deal.
0
0