Which option is the term for what happens when a computer code is developed to take advantage of vulnerability?
For example, suppose that a vulnerability exists in a piece of software, but nobody knows about this vulnerability.
A.
a vulnerability
B.
a risk
C.
an exploit
D.
an attack
E.
a joke
C