One of the main jobs of computer security researchers is to try to design strategies to mitigate the risks that are identified in a ____ analysis.

A. concern
B. baseline
C. threat
D. foundational


Answer: C

Computer Science & Information Technology

You might also like to view...

Editing options include:

A) tracked changes. B) comments. C) tracked changes and comments. D) tracked changes, comments, and filling in forms.

Computer Science & Information Technology

Which of the following advantages to virtualization provides significant cost savings in utility usage?

A. hardware consolidation B. power savings C. system recovery D. system duplication

Computer Science & Information Technology

What OC level is primarily used as a regional ISP backbone, and occasionally by very large hospitals, universities, or other major enterprises??

A. ?OC-3 B. ?OC-12 C. ?OC-48 D. ?OC-96

Computer Science & Information Technology

In the figure above, if the first image is the original, the number 5 is a sample of the effects of the ____________________ tool.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology