Existence of weakness in a system or network is called _______
(a) Threat
(b) Vulnerability
(c) Exploit
(d) Attack
The question was asked in examination.
This interesting question is from Hacking Terminologies topic in chapter Cyber Security of Cyber Security