The primary tool for hardening symmetric cryptography is public key infrastructure. Select one: True False ABC Corp recently released a new version of their Web-based inventory management software. Unfortunately a bug in their code was discovered that would allow an attacker to take full control of the host Web server. In information security this is considered to be a(n) Select one: a. flaw b. weakness c. vulnerability d. exploit Solution The primary tool for hardening symmetric cryptography is public key infrastructure. Select one: True False ABC Corp recently released a new version of their Web-based inventory management software. Unfortunately a bug in their code was discovered that would allow an attacker to take full control of the host Web server. In information security this is considered to be a(n) Select one: a. flaw b. weakness c. vulnerability d. exploit .