Drag and drop the security concept on the left onto the example of that concept on the right.
Select and Place:
Threat
|
Vulnerability
|
Risk Assessment
|
Exploit
|
|
network is compromised
|
Threat
|
lack of an access list
|
Vulnerability
|
configuration review
|
Risk Assessment
|
leakage of confidential information
|
Exploit
|
|
WARNING
the answers are mixed, do not specify in the comment number or the letter of the answer
please write answer#A instead A, answer#B instead B...