A ________ is anything that might hinder or present an asset from providing appropriate levels of the key security services.
A. vulnerability B. threat
C. risk D. control
B. threat
You might also like to view...
What benefit is gained by placing the bottom of the stack at array index 0 when designing an array-based stack data type?
What will be an ideal response?
A password audit has revealed that a significant percentage if end-users have passwords that are easily cracked. Which of the following is the BEST technical control that could be implemented to reduce the amount of easily "crackable" passwords in use?
A. Credential management B. Password history C. Password complexity D. Security awareness training
A semaphore that does not specify the order in which processes are removed from the queue is a ________ semaphore.
A) weak B) general C) strong D) binary
The shortcut keys used to center a paragraph are ____.
A. COMMAND-T B. COMMAND-M C. COMMAND-SHIFT-T D. COMMAND-E