Exam 200-201 Question id=5999 Security concepts

Drag and drop the security concept from the left onto the example of that concept on the right.
Select and Place:

threat
vulnerability
risk
exploit
anything that can exploit a weakness that was not mitigated
threat
a gap in security or software that can be utilized by threats
vulnerability
possibility for loss and damage of an asset or information
risk
taking advantage of a software flaw to compromise a resource
exploit

WARNING

the answers are mixed, do not specify in the comment number or the letter of the answer
please write answer#A instead A, answer#B instead B...
Subject:

only logged users can write comments