Answer:
The answer to this question is vulnerability and risk.
Step-by-step explanation:
Vulnerability is there us misconfiguration in the system and we know that our system is vulnerable means the hacker can gain unauthorized access to our system.
Risk is when there are chances that a misconfiguration might happen in our system in future so that hacker could gain unauthorized access to the system.