Which option is the term for what happens when a computer code is developed to take advantage of vulnerability?

Which option is the term for what happens when a computer code is developed to take advantage of vulnerability?
For example, suppose that a vulnerability exists in a piece of software, but nobody knows about this vulnerability.

Which option is the term for what happens when a computer code is developed to take advantage of vulnerability?
For example, suppose that a vulnerability exists in a piece of software, but nobody knows about this vulnerability.

A.
a vulnerability

B.
a risk

C.
an exploit

D.
an attack

E.
a joke



Leave a Reply 1

Your email address will not be published. Required fields are marked *