Respuesta :
Answer:
Usually this term is used when it's too late for preventive technical mesures, so probably a system, an account, a file is considered to be compromised when unauthorised ( by the user/ administrator) access determined a breach in the security system.
Therefore your answer would be B. the potential for an intrusion
Answer: C
Explanation:
A compromise is a breach in the security of a computer system, an account, a file, or another online resource.
This definition encompasses all the components of information technology as we know it today. It covers the basic computer system, a user account and an online resources. The other definitions are either too rigid or too broad.