The following questions consist of a single sentence with one blank only. You are given six words denominated by A, B, C, D, E and F as answer choices and from the six choices you have to pick two correct answers, either of which will make the sentence meaningfully complete.
Unauthorised leaks, hacking and other cybercrimes have _________ data bases vulnerable.Â