Answer the following statement(s) true (T) or false (F)
1. Based on the FAIR framework, the vulnerability level is estimated based on the loss event frequency and
threat capability
2. Most standard frameworks share the same 6 common activities.
3. A system that is remotely accessible via VPN is more likely to be compromised by a threat than a system
that is Internet accessible
4. An information security officer usually sets the strategy and approach and review the findings at the end
of the project.
5. The criticality and importance of a business may increase the integrity and availability impacts of a threat.
1. False
2. True
3. False
4. False
5. True
You might also like to view...
Which of the following is not a queue operation?
a) enqueue b) dequeue c) first d) isEmpty e) all of the above are queue operations
The basic generic functional interface ________ in package java.util.function contains method get that takes no arguments and returns a value of type T.
a. UnaryOperator
A(n) ________ cell reference is a cell location that is stored as a certain number of rows and columns from the currently selected cell
Fill in the blank(s) with correct word
Answer the following statements true (T) or false (F)
1. When constructing a recursive solution, you should assume that a recursive call’s postcondition is true if its precondition is true. 2. Every recursive method must have a base case. 3. A recursive solution can have more than one base case. 4. The binary search algorithm can be applied to an unsorted array. 5. The base case for a recursive solution to finding the kth smallest item in an array cannot be predicted in advance.