What is another term used for a security weakness?
A. threat
B. vulnerability
C. risk
D. opportunity
Answer: B
You might also like to view...
The arrow operator (->) specifies
a. a member of a struct or class that is pointed to by a pointer variable b. the pointer member only of a struct or a class that is pointed to by a pointer variable c. less than or equal d. is known as NULL
Which of the following should identify critical systems and components?
A. MOU B. BPA C. ITCP D. BCP
The process that includes identifying an event, such as a button click as being of interest, and associating a method to be executed when the event occurs describes ____.
A. wiring an event B. delegating an event C. balancing an event D. referencing an event
Case Based Critical ThinkingMark's team is working on complex artwork for a 120-page corporate annual. Mark tells his team to be certain that all the artwork that they create is created with layers. His Photoshop gurus are experts at using layers in Photoshop, but Mark is curious to see how they will translate those abilities to working with layers in Illustrator. One of Mark's senior designers is struggling with working with a clipping set. He has an object that he wants to use as a mask, and he knows which artwork he wants to mask, but he can't seem to make it happen. Mark tells him that the problem could be which of the following?
A. the clipping mask and the objects to be masked are on the same layer
B. he's trying to use a non