The __________ strategy is the choice to do nothing to protect a vulnerability and to accept the outcome of its exploitation.

A. defense
B. transference
C. mitigation
D. acceptance


Answer: D

Computer Science & Information Technology

You might also like to view...

In Linux, the default standard input is the ____.

A. microphone B. screen C. mouse D. keyboard

Computer Science & Information Technology

Which of the following is NOT a good reason to define Table Relationships?

A) Other people may use the table. B) Joins will automatically be added. C) There is no risk of using the wrong type of join. D) Table Relationships will auto-define the primary key.

Computer Science & Information Technology

Which Dropbox file stores information on shared directories associated with a Dropbox user account and file transfers between Dropbox and the client's system?

a. filecache.dbx b. read_filejournal c. filetx.log d. filecache.dll

Computer Science & Information Technology

System.out.println("Your name is " + yourName);The above statement is an example of ____, which is used to join Strings.

A. concatenation B. referencing C. parsing D. buffering

Computer Science & Information Technology