Your computer is vulnerable by the protection of your firewall.
If your firewall is open, or have no firewall, you are pretty much a siting duck.
A computer threat is a virus that infects your computer to do unwanted and/or involuntary actions you did not request/intend/mistakenly do.
The computer threat seeks for openness of a computer vulnerability.
No.
threat, vulnerability and impact
An advantage of integrating OPSEC principles in your day-to-day operations is that it:
D. threat, vulnerability, and impact.
True
A risk assessment looks at how the threat can exploit the vulnerability of the asset in question, in terms of Confidentiality, integrity and Availability (CIA). A vulnerability assessment is a intake of the assets on hand and the noted vulnerability associated with them. A risk assessment is by far deeper assessment, and can incorporate other forms of assessments to formalize a single set of recommendations.
A. True
risk = criticality x threat vulnerability
threat assessment, criticality assessment, and vulnerability assessment.
Do some more research
Vulnerability
All of them