Once a basic attack tree is completed, you can assign values to each leaf node. These values are often called ____.

A. weights
B. ranks
C. risk levels
D. indicators


Answer: D

Computer Science & Information Technology

You might also like to view...

Layer names can include ____.

A. spaces B. punctuation marks C. letters D. all of the above

Computer Science & Information Technology

Which is NOT an example of a text effect within a table?

A) Rotate B) Reflection C) Shadow D) Glow

Computer Science & Information Technology

Which of the following video file types is a cross-platform format that is the most popular Internet video format?

A) .wmv B) .rm C) .avi D) .mpeg

Computer Science & Information Technology

You know your current IT personnel knows nothing about SAP, so you will need to train them or hire experienced people. This is an assessment of your ________ feasibility.

A. Behavioral B. Economic C. Operational D. Technical

Computer Science & Information Technology