Which one of the following formulas best describes the relationship among the concepts of risk, threat, and vulnerability?

a. Threat = Vulnerability + Risk
b. Risk = Threat + Vulnerability
c. Threat = Risk * Vulnerability
d. Risk = Threat * Vulnerability


Answer: c. Threat = Risk * Vulnerability

Computer Science & Information Technology

You might also like to view...

Which of the following statements about heavyweight components is false?

a. AWT components are not heavyweight components. b. Several Swing components are heavyweight components. c. The look-and-feel may vary across platforms. d. The functionality may vary across platforms.

Computer Science & Information Technology

Use of the ________ comparison operator results in true when the field's value is less than or equal to the specified value

A) = B) >= C) <= D) <

Computer Science & Information Technology

____________________ type is composed of pixels, and, like images, can develop jagged edges when enlarged.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The OUTER JOIN clause is used to return only the rows that actually match based on the join predicate

Indicate whether the statement is true or false

Computer Science & Information Technology