Que: Compromising confidential information comes under _________

a. Bug
b. Threat
c. Vulnerability
d. Attack
Answer: Threat

Leave a Comment