A vulnerability is defined as any ______ that can be exploited by an adversary to gain access to an asset.
[ ] System
[ ] Procedure
[ ] Information
[ ] Weakness
a. System
b. Procedure
c. Information
d. Weakness