10. _________ is the sum of all the possible points in software or system where unauthorized users can enter as well as extract data from the system. a) Attack vector b) Attack surface c) Attack point d) Attack arena
10. _________ is the sum of all the possible points in software or system where unauthorized users can enter as well as extract data from the system. a) Attack vector b) Attack surface c) Attack point d) Attack arena
Chapter14: System Administration
Section: Chapter Questions
Problem 8VE
Related questions
Question
10. _________ is the sum of all the possible points in software or system where unauthorized users can enter as well as extract data from the system.
a) Attack
b) Attack surface
c) Attack point
d) Attack arena
Expert Solution
![](/static/compass_v2/shared-icons/check-mark.png)
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
This is a popular solution!
Trending now
This is a popular solution!
Step by step
Solved in 2 steps
![Blurred answer](/static/compass_v2/solution-images/blurred-answer.jpg)
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Recommended textbooks for you
![Systems Architecture](https://www.bartleby.com/isbn_cover_images/9781305080195/9781305080195_smallCoverImage.gif)
Systems Architecture
Computer Science
ISBN:
9781305080195
Author:
Stephen D. Burd
Publisher:
Cengage Learning
![Systems Architecture](https://www.bartleby.com/isbn_cover_images/9781305080195/9781305080195_smallCoverImage.gif)
Systems Architecture
Computer Science
ISBN:
9781305080195
Author:
Stephen D. Burd
Publisher:
Cengage Learning