Que: Compromising confidential information comes under _________ a. Bug b. Threat c. Vulnerability d. Attack Answer: Threat