What is another term used for a security weakness?

A. threat
B. vulnerability
C. risk
D. opportunity


Answer: B

Computer Science & Information Technology

You might also like to view...

The arrow operator (->) specifies

a. a member of a struct or class that is pointed to by a pointer variable b. the pointer member only of a struct or a class that is pointed to by a pointer variable c. less than or equal d. is known as NULL

Computer Science & Information Technology

Which of the following should identify critical systems and components?

A. MOU B. BPA C. ITCP D. BCP

Computer Science & Information Technology

The process that includes identifying an event, such as a button click as being of interest, and associating a method to be executed when the event occurs describes ____.

A. wiring an event B. delegating an event C. balancing an event D. referencing an event

Computer Science & Information Technology

Case Based Critical ThinkingMark's team is working on complex artwork for a 120-page corporate annual. Mark tells his team to be certain that all the artwork that they create is created with layers. His Photoshop gurus are experts at using layers in Photoshop, but Mark is curious to see how they will translate those abilities to working with layers in Illustrator. One of Mark's senior designers is struggling with working with a clipping set. He has an object that he wants to use as a mask, and he knows which artwork he wants to mask, but he can't seem to make it happen. Mark tells him that the problem could be which of the following?

A. the clipping mask and the objects to be masked are on the same layer B. he's trying to use a non sublayer as a clipping mask C. the object to be used as the mask is higher in the stacking order than the objects to be masked D. he is using a sublayer as a clipping set

Computer Science & Information Technology