An incident is an event in which the integrity of a(n) __________ is compromised.

A. service level agreement (SLA)
B. IT infrastructure
C. forensic report
D. vulnerability scan


Answer: B

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. Every programmer must know all the details of what that programmer's team mates are doing in their projects to do the work assigned. Why? 2. Procedural abstraction involves information hiding in that only the contract between the programmer using the function (the client) and author of a function is known to either. 3. Code after a return or a call to the exit function is executed will not be executed. function, and returns to the operating system if return is executed out of main. If exit is executed anywhere, the program is terminated and control is returned to the operating system. 4. A sequence of calls to the library function rand() generates mathematically correct random number sequences.

Computer Science & Information Technology

The ________ can be used to move to the next field when entering data into a form on the screen.

A. Esc key B. CTRL key C. Tab key D. Enter key

Computer Science & Information Technology

Hasty responses to e-mails are generally preferred since it shows a prompt response to questions

Indicate whether the statement is true or false

Computer Science & Information Technology

A(n) ____________________ is a basic artistic element that places an outline on an object or on type.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology