Q.

Compromising confidential information comes under _________

A. bug
B. threat
C. vulnerability
D. attack
Answer» B. threat
2.1k
0
Do you find this helpful?
14

Discussion

No comments yet