a. Vulnerabilities without risk |
b. Vulnerabilities without attacker |
c. Vulnerabilities without action |
d. Vulnerabilities no one knows |
Answer: Vulnerabilities without risk |
a. Vulnerabilities without risk |
b. Vulnerabilities without attacker |
c. Vulnerabilities without action |
d. Vulnerabilities no one knows |
Answer: Vulnerabilities without risk |