Which cybersecurity term is defined as the potential for an attack on a resource?
A. Impact
B. Vulnerability
C. Risk
D. Threat
Answer: D. Threat
You might also like to view...
Describe three functions of a certificate authority (CA).
What will be an ideal response?
Which of the following is not correct about queries and SQL?
A) When you create a query Access creates the SQL statements automatically. B) SQL uses the same command set as VBA, except that it is used for queries instead of macros. C) SQL helps you ask a question of the data in your database. D) Access stores SQL statements in the background.
A repeater also functioned as an amplifier.
Answer the following statement true (T) or false (F)
Case 2-2 You and Ellen are cramming for your exam about the second phase of the program development life cycle, the design of the user interface. Ellen tells you the percentage of program design time that developers spend on the user interface. You think that she is exaggerating but then you double-check and see that she is right. What range does she give you?
A. 25 percent to 40 percent B. 30 percent to 48 percent C. 35 percent to 60 percent D. 39 percent to 70 percent