Intrinsic vulnerabilities, such as the _____________, are related to the characteristics of the asset. Refer to scenario 1.
Intrinsic vulnerabilities, such as the _____________, are related to the characteristics of the asset. Refer to scenario 1.
Vulnerabilities can be divided into Intrinsic and Extrinsic. Intrinsic are related to the asset Extrinsic are external factors The answer based on Scenario 1 is C
C. The software is the asset
C is the hey
The presence of the complicated user interface is what makes the system vulnerable to data intrusion