A(n) __________ is a potential for violation of security, which exists when there is a circumstance, capability, action or event that could breach security and cause harm.

A) threat
B) attack
C) risk
D) attack vector


A) threat

Computer Science & Information Technology

You might also like to view...

The three layers that compose a typical GUI on a Linux system are ________, ________ and ________.

a) the kernel, a video driver, the X Window System b) the X Window System, a display adapter, a desktop environment c) the X Window System, a window manager, a desktop environment d) a desktop environment, a video driver, a display adapter

Computer Science & Information Technology

____________________ changes the intensity of colors.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following statements is false?

a. Functional interfaces are also known as single abstract method (SAM) interfaces. b. Package java.util.function contains six basic functional interfaces BinaryOperator, Consumer, Function, Predicate, Supplier and UnaryOperator. c. There are many specialized versions of the six basic functional interfaces for use with int, long and double primitive values. There are also generic customizations of Consumer, Function and Predicate for binary operations—that is, methods that take two arguments. d. All of these statements are true.

Computer Science & Information Technology

What does RMON use to collect traffic data at a remote switch and send the data to a management device?

A. Simple Network Management Protocol B. User Datagram Protocol C. Virtual Private Network D. Wide Area Information Service

Computer Science & Information Technology