menu
QAmmunity.org
Login
Register
My account
Edit my Profile
Private messages
My favorites
Ask a Question
Questions
Unanswered
Tags
Categories
Ask a Question
________ is the general name for a security flaw in a program. Group of answer choices A security fault A virus Malware A vulnerability
asked
Sep 14, 2023
227k
views
7
votes
________ is the general name for a security flaw in a program. Group of answer choices A security fault A virus Malware A vulnerability
Computers and Technology
high-school
Kharlos Dominguez
asked
by
Kharlos Dominguez
7.1k
points
answer
comment
share this
share
0 Comments
Please
log in
or
register
to add a comment.
Please
log in
or
register
to answer this question.
1
Answer
4
votes
Answer:
Hi there it is A vulnerability
Step-by-step explanation:
Vlad Isoc
answered
Sep 20, 2023
by
Vlad Isoc
7.8k
points
ask related question
comment
share this
0 Comments
Please
log in
or
register
to add a comment.
← Prev Question
Next Question →
Related questions
asked
Jul 5, 2024
155k
views
An attacker exploited a vulnerability on a website frequently visited by a group of bank employees. Once the employees visit the site, the attacker's malware infects their computers. What type of attack
Pata
asked
Jul 5, 2024
by
Pata
7.2k
points
Computers and Technology
high-school
1
answer
4
votes
155k
views
asked
Jan 14, 2024
195k
views
What is usually a documented way to circumvent controls or take advantage of weaknesses in control systems? 1) Exploit 2) Vulnerability 3) Backdoor 4) Malware
Ram Talreja
asked
Jan 14, 2024
by
Ram Talreja
8.0k
points
Business
high-school
1
answer
2
votes
195k
views
asked
Mar 27, 2023
160k
views
Which type of malware exploits a vulnerability on one system and then immediately searches for another computer on the network that has the same vulnerability
Genaut
asked
Mar 27, 2023
by
Genaut
8.3k
points
Computers and Technology
high-school
1
answer
12
votes
160k
views
Ask a Question
Welcome to QAmmunity.org, where you can ask questions and receive answers from other members of our community.
9.5m
questions
12.2m
answers
Other Questions
“What does it mean when we “rework” copyrighted material?”
The book shows how to add and subtract binary and decimal numbers. However, other numbering systems are also very popular when dealing with computers. The octal (base 8) numbering system is one of these.
Seven basic internal components found in a computer tower
describe an advance in technology that makes life more enjoyable. what discoveries contribute to this technology?
Disadvantages of using animation in advertising? advantages and disadvantages of using animation for education? advantages and disadvantages of using animation in entertainment?
Twitter
WhatsApp
Facebook
Reddit
LinkedIn
Email
Link Copied!
Copy
Search QAmmunity.org