Any step you take to ward off a threat is called a:

A. countermeasure
B. risk
C. vulnerability
D. TPS


Answer: A

Computer Science & Information Technology

You might also like to view...

All of Java's control statements can be nested.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Assuming that x and y are equal to 3 and 2, respectively, after the statement x -= y executes, the values of x and y will be:

a. x: 5; y: 3 b. x: 3; y: -1 c. x: 3; y: 5 d. x: 1; y: 2

Computer Science & Information Technology

The major number of a device represents

A. the maximum data rate for the device B. a way to locate the device driver

Computer Science & Information Technology

A function may require ____, which are values used by the function.

A. terms B. parameters C. ids D. names

Computer Science & Information Technology