An exposure occurs when a vulnerability _____________.
a. creates the possibility of incurring a loss or experiencing harm.
b. is reported to authorities as a source of risk.
c. is discovered by a penetration testing team.
d. is published in the Common Vulnerabilities and Exposures (CVE) database.

Q&A Education