An activity that has the potential to cause harm to information systems or networks is called a:
A.
Vulnerability
B.
Threat agent
C.
Weakness
D.
Threat
Explanation:
A threat is an event or activity with potential to cause harm to
information systems or networks.