24 Chapter 1 ■ Getting Started with Ethical Hacking
- What does TOE stand for?
A. Target of evaluation
B. Time of evaluation
C. Type of evaluation
D. Term of evaluation - Which of the following best describes a vulnerability?
A. A worm
B. A virus
C. A weakness
D. A rootkit