Answer:
vulnerability, risk
Explanation:
A vulnerability would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a risk is a combination of the likelihood that such a misconfiguration could happen, a hacker’s exploitation of it, and the impact if the event occurred.
Answer:a wavy red line
Explanation:
Hope this helps
Can I have brainliest pls
Answer:
Link Aggregation Control Protocol
Explanation:
Link Aggregation Control Protocol can be used to assist in the formation of port channel bundles of physical links.
Link Aggregation Control Protocol is an IEEE standard defined in IEEE 802.3ad. LACP lets devices send Link Aggregation Control Protocol Data Units (LACPDUs) to each other to establish a link aggregation connection.
The type of data which causes concern for institutions or business when collected, stored, and not secured properly is Personal Identifying Information. The correct option is B.
<h3>What is personal identifying information?</h3>
A personal identifying information is the representation of data or information of an individual that can be used to identify an individual specifically.
Some examples of a personal identifying information includes Social security number (SSN), E-mail address, Driver's license number. Bank account number, Full name and Passport number.
Business organizations should secure personal identifying information properly, in order to avoid unauthorized access by hackers.
Thus, the correct option is B.
Learn more about personal identifying information.
brainly.com/question/4997276
#SPJ1