An information system on your network that is not set to require the use of a common access card (CAC) or password would be considered a
a. threat.
b. vulnerability.
c. compromise.
d. risk.
Answer: B
Quiz, Objective, Multiple Choice Question (MCQ), Test Bank Solution and Short Answers.