___________ is a weakness that can be exploited by attackers.
(a) System with Virus
(b) System without firewall
(c) System with vulnerabilities
(d) System with a strong password
This question was addressed to me in examination.
This intriguing question originated from Bugs and Vulnerabilities topic in division Cyber Laws, Security Tools, Bugs and Vulnerabilities of Cyber Security