Which option is the term for the likelihood that a particular threat using a specific attack will exploit particular
vulnerability of a system that results in an undesirable consequence?
Which option is the term for what happens when a computer code is developed to take advantage of
vulnerability?
For example, suppose that a vulnerability exists in a piece of software, but nobody knows about this
vulnerability.