What is defined as specific avenues that threat agents can exploit to attack an information asset?

A. liabilities
B. defenses
C. vulnerabilities
D. obsolescence


Answer: C

Computer Science & Information Technology

You might also like to view...

A selection structure consists of a(n) __________ __________ together with one or more blocks of statements.

Fill in the blank(s) with correct word

Computer Science & Information Technology

Hand trace a stack X through the following operations:

``` X.push(new Integer(4)); X.push(new Integer(3)); Integer Y = X.pop(); X.push(new Integer(7)); X.push(new Integer(2)); X.push(new Integer(5)); X.push(new Integer(9)); Integer Y = X.pop(); X.push(new Integer(3)); X.push(new Integer(9)); ```

Computer Science & Information Technology

A palindrome is a number or a text phrase that reads the same backward as forward. For example, each of the following five-digit integers is a palindrome: 12321, 55555, 45554 and 11611. Write a script that reads in a five-digit integer and determines whether it is a palindrome. If the number is not five digits, output HTML text that displays an alert dialog indicating the problem to the user. When the user dismisses the alert dialog, allow the user to enter a new value.

What will be an ideal response?

Computer Science & Information Technology

System protection is off by default

Indicate whether the statement is true or false

Computer Science & Information Technology