Your network administrator finds a virus in the network software. Fortunately,
she was able to eliminate it before it resulted in a denial-of-service attack, which
would have prevented legitimate users of the networked database from
gaining access to the records needed. It turns out that the network software
did not have adequate security protections in place. this could be considered.
A. threat
B. vulnerability