____ is a threat-rating system developed by Microsoft and is used to assess risk with great granularity.

A. Qualitative assessment
B. DREAD
C. Quantitative assessment
D. Risk-scaling


Answer: B

Computer Science & Information Technology

You might also like to view...

Allows each browser to introduce its own support for unfinished CSS properties without conflicting with final specs or with other browsers.

a. Polyfills b. Vendor prefixes c. Multiple backgrounds d. Gradient backgrounds e. Opacity property

Computer Science & Information Technology

The chip that contains software to start the computer is the ___________. Note: Use the acronym (the letters) commonly used for this part

Fill in the blank(s) with correct word

Computer Science & Information Technology

In the accompanying figure, you can remove a column by clicking just above the field name to select the column and then clicking the ____ key(s).

A. CTRL + DELETE B. CTRL + Y C. DELETE D. CTRL+ALT

Computer Science & Information Technology

When converting analog data to digital signals, the frequency at which the snapshots are taken is called the ____ rate.?

A. ?baud B. ?sampling C. ?bps D. ?byte

Computer Science & Information Technology