Any step you take to ward off a threat is called a:
A. countermeasure
B. risk
C. vulnerability
D. TPS
Answer: A
Computer Science & Information Technology
You might also like to view...
All of Java's control statements can be nested.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Assuming that x and y are equal to 3 and 2, respectively, after the statement x -= y executes, the values of x and y will be:
a. x: 5; y: 3 b. x: 3; y: -1 c. x: 3; y: 5 d. x: 1; y: 2
Computer Science & Information Technology
The major number of a device represents
A. the maximum data rate for the device B. a way to locate the device driver
Computer Science & Information Technology
A function may require ____, which are values used by the function.
A. terms B. parameters C. ids D. names
Computer Science & Information Technology