In computer security, a threat ____ is an attempt (usually in the form of a document or diagram) to systematically identify the ways that technology might be vulnerable to a malicious attack.

A. simulation
B. analysis
C. construction
D. encapsulation


Answer: B

Computer Science & Information Technology

You might also like to view...

Define boxing and unboxing.

What will be an ideal response?

Computer Science & Information Technology

Which of the following is not an advantage of using a logical model?

A) A system based on a logical model is more stable. B) The logical model helps the analyst understand the business being studied. C) It facilitates communication with the users. D) A logical model clarifies which processes are automated.

Computer Science & Information Technology

In Web design, the lines of the item in the accompanying figure represent ____.

A. Web pages B. the connection of Web pages C. decision points D. steps

Computer Science & Information Technology

Press ________ to start a presentation from the first slide

A) F4 B) F9 C) F5 D) F1

Computer Science & Information Technology