In information security, ____ exists when a vulnerability known to an attacker is present.
A. threat
B. loss
C. risk
D. exposure
Answer: D
Computer Science & Information Technology
You might also like to view...
Given the following code snippet, what will be displayed on the web page if the user enters 4 at the prompt?
``` var myNum = prompt("Enter a number:"); var result = myNum + myNum; document.write(result); ``` a. 44 b. 8 c. NaN d. 4 4
Computer Science & Information Technology
You use a(n) ________ program to view information on the World Wide Web
Fill in the blank(s) with correct word
Computer Science & Information Technology
With Microsoft Project 2010, all risk associated with a project can be eliminated.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
The transfer of live transactions in real time to an off-site facility is called ____________________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology