When performing a risk analysis, which of the following is considered a threat?

A.
The potential exploitation of vulnerability
B.
The transference of risk to another party
C.
The presence of a risk in the environment
D.
The lack of mitigation for vulnerabilities