✅ The verified answer to this question is available below. Our community-reviewed solutions help you understand the material better.
In the context of cybersecurity, which of the following terms share a similar relationship to the way an exploit relates to a threat?