Incorrect!



Answer: A security weakness in the design, implementation, operation, or internal control of a computer or system


0 Next