A threat analysis usually includes a description of the ____, or potential avenues of attack, that could allow the system to be exploited.

A. exploits
B. marks
C. command points
D. vulnerabilities


Answer: D

Computer Science & Information Technology

You might also like to view...

Which of the following operators takes a Boolean expression and reverses its logical value?

a. Xor b. And c. <> d. Not

Computer Science & Information Technology

How much memory is reserved for the following variables in MS Visual C++?

``` int s, int *s_ptr; double q, *q_ptr;``` A. 16 B. 20 C. 24 D. 30

Computer Science & Information Technology

Printer technologies produce characters and graphics as a series of small ____.

A. squares B. dots C. spots D. characters

Computer Science & Information Technology

In the figure above, what is the number 5 referring to?

A. Delete Layer button B. Create a new layer button C. Move Layer button D. Layer Options button

Computer Science & Information Technology