I had an exam in college that asked the following question: A person sends a worm to an unprotected computer, this is an example of a/an A) Threat B) Exploit C) Vulnerability D) Threat Agent I picked Threat and was marked wrong. They said the answer was Exploit. I was able to successfully argue that it was a threat by stating that until the worm is executed, it is a threat and would then exploit the system only if it was successful. Now their argument was by definition, the internet is a threat and it is up to the user to protect. Therefore, the worm is designed by nature to be an exploit. But if we look into that theory, then the internet would become a threat agent. Whereas a way to deliver all of the above. Question is.... Am I right with my theory? Please advise and explain. Thanks!