Q.

Compromising confidential information comes under _________.

A. Bug
B. Threat
C. Vulnerability
D. Attack
Answer» B. Threat
2k
0
Do you find this helpful?
19

Discussion

No comments yet