Compromising Confidential Information Comes Under _______ (A) Bug (B) Threat (C) Attack (D) Vulnerability

The answer is (C) Threat.

Explore more such questions and answers at BYJU’S.

Was this answer helpful?


0 (0)

Upvote (0)

Choose An Option That Best Describes Your Problem

Thank you. Your Feedback will Help us Serve you better.

Leave a Comment

Your Mobile number and Email id will not be published. Required fields are marked *




Free Class