____ incidents include such things as pre-attack probes, unauthorized access attempts, or structural vulnerabilities.

A. Potential
B. Actual
C. Reference
D. Auditable


Answer: A

Computer Science & Information Technology

You might also like to view...

MC A foreign-key field value can appear________in its own table, but must appear________as the primary key of another table.

a) many times, at least once. b) exactly once, many times. c) many times, exactly once. d) None of the above.

Computer Science & Information Technology

What process group within the ISO 12207 standard consists of the traditional development lifecycle process activities?

A. Project enabling B. Software implementation C. Quality assurance D. Software integration

Computer Science & Information Technology

Which of the following is not a property of LinkedListNode?

a) Value b) Reference c) Previous d) Next

Computer Science & Information Technology

____________________ RFID tags do not have their own power supply. Instead, the tiny electrical current induced in the antenna by the incoming signal from the transceiver provides enough power for the tag to send a response.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology