Consider the scenarios.
1. A wifi connection without encryption.
2. Presence of malicious virus
3. Authentication with weak password.
In network security paradigm given scenarios can be classified as:
(A). 1. Threat 2. Threat 3. Vulnearability
(B). 1. Vulnearability 2. Threat 3. Threat
(C). 1. Threat 2. Vulnearability 3. Vulnearability
(D). 1. Vulnearability 2. Threat 3. Vulnearability