Once a basic attack tree is completed, you can assign values to each leaf node. These values are often called ____.

A. weights
B. ranks
C. risk levels
D. indicators


Answer: D

Computer Science & Information Technology

You might also like to view...

To allow Remote Desktop Protocol (RDP) access to DirectAccess clients, which port below must be opened on the client side firewall?

A. 587 B. 1720 C. 3389 D. 8080

Computer Science & Information Technology

The dollar amounts in support budgets vary little from one help desk operation to another; these amounts are based on industry standards.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When making a presentation to an audience using PowerPoint, you use Notes Page view.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In the block letter style, all letter parts begin at the left margin.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology