Once a basic attack tree is completed, you can assign values to each leaf node. These values are often called ____.
A. weights
B. ranks
C. risk levels
D. indicators
Answer: D
Computer Science & Information Technology
You might also like to view...
To allow Remote Desktop Protocol (RDP) access to DirectAccess clients, which port below must be opened on the client side firewall?
A. 587 B. 1720 C. 3389 D. 8080
Computer Science & Information Technology
The dollar amounts in support budgets vary little from one help desk operation to another; these amounts are based on industry standards.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
When making a presentation to an audience using PowerPoint, you use Notes Page view.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
In the block letter style, all letter parts begin at the left margin.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology