A threat analysis usually includes a description of the ____, or potential avenues of attack, that could allow the system to be exploited.
A. exploits
B. marks
C. command points
D. vulnerabilities
Answer: D
Computer Science & Information Technology
You might also like to view...
Which of the following operators takes a Boolean expression and reverses its logical value?
a. Xor b. And c. <> d. Not
Computer Science & Information Technology
How much memory is reserved for the following variables in MS Visual C++?
``` int s, int *s_ptr; double q, *q_ptr;``` A. 16 B. 20 C. 24 D. 30
Computer Science & Information Technology
Printer technologies produce characters and graphics as a series of small ____.
A. squares B. dots C. spots D. characters
Computer Science & Information Technology
In the figure above, what is the number 5 referring to?
A. Delete Layer button B. Create a new layer button C. Move Layer button D. Layer Options button
Computer Science & Information Technology