Which choice describes the path of an attack?

A. A threat source location
B. A threat vector
C. A threat vehicle
D. The threat action effect


Answer: B. A threat vector

Computer Science & Information Technology

You might also like to view...

Like other block-level elements, you can ____ tables using the same styles you've already studied.

A. float B. resize C. both a and b D. neither a nor b

Computer Science & Information Technology

Photoshop CS6 is ____ software.

A. image database B. photo processing C. image processing D. photo editing

Computer Science & Information Technology

Parental Control options are accessed through the ________ located in the Research task pane

A) Search for box B) Research options command C) Get services on Office Marketplace command D) Reference options drop down list

Computer Science & Information Technology

The ____________________ is the fundamental way to obtain new scientific knowledge and understanding.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology