A. Confront the client in a respectful manner and ask her about the data.
B. Ignore the data and continue the assessment until completed as agreed.
C. Copy the data to removable media and keep it in case you need it.
D. Immediately stop work and contact the proper legal authorities.
A. Likelihood is the likely source of a threat that could exploit a vulnerability.
B. Likelihood is the probability that a threat-source will exploit a vulnerability.
C. Likelihood is the probability that a vulnerability is a threat-source.
D. Likelihood is a possible threat-source that may exploit a vulnerability.