Select the statement about system vulnerabilities that is TRUE from the following. i. A system threat is a vulnerability. ii. An exploitable flaw in a system's design is referred to as a vulnerability. iii. Protocols, operating systems, applications, hardware, and system design all have vulnerabilities. iv. Exploits known as vulnerabilities are found in software and hardware products every day.