Once a basic attack tree is completed, you can assign values to each leaf node. These values are often called ____.
A. weights
B. ranks
C. risk levels
D. indicators
Answer: D
Computer Science & Information Technology
You might also like to view...
Layer names can include ____.
A. spaces B. punctuation marks C. letters D. all of the above
Computer Science & Information Technology
Which is NOT an example of a text effect within a table?
A) Rotate B) Reflection C) Shadow D) Glow
Computer Science & Information Technology
Which of the following video file types is a cross-platform format that is the most popular Internet video format?
A) .wmv B) .rm C) .avi D) .mpeg
Computer Science & Information Technology
You know your current IT personnel knows nothing about SAP, so you will need to train them or hire experienced people. This is an assessment of your ________ feasibility.
A. Behavioral B. Economic C. Operational D. Technical
Computer Science & Information Technology