Answer:
Option B i.e., vulnerabilities is the correct option
Step-by-step explanation:
In the statement, Vulnerabilities is detected and understand in the security of the operating system of the Protection Analysis that aim to attain the final project which is undertaken by the ARPA that was earlier used at the place of the Internet for the protection of the national confidential data by the U.S military.