Which option is a weakness in an information system that an attacker might leverage to gain
unauthorized access to the system or its data?
A.
hack
B.
mitigation
C.
risk
D.
vulnerability
E.
exploit
Explanation:
A flaw or weakness in a system’s design or implementation that could be exploited.