An information system on your network that is not set to require the use of a common access card (CAC) or password would be considered a

An information system on your network that is not set to require the use of a common access card (CAC) or password would be considered a



a. threat.
b. vulnerability.
c. compromise.
d. risk.




Answer: B