Which of the following is a tool that not only exposes threats to an organization, but points out strengths as well?

A) Denial of Service B) SWOT analysis C) Repudiation D) Threat tree


B

Computer Science & Information Technology

You might also like to view...

Out of the following list, which runtime complexity scales the worst?

a. O(1) b. O(n) c. O(n2) d. O(log n)

Computer Science & Information Technology

An SQL keyword defines the purpose and the structure of an SQL statement

Indicate whether the statement is true or false

Computer Science & Information Technology

What should you implement to prevent man-in-the-middle attacks against the Diffie-Hellman algorithm?

A. One-way hash B. Digital certificates C. Zero Knowledge Proof D. Private keys

Computer Science & Information Technology

A DNS zone that is stored and replicated across multiple domain servers is called a(n)__________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology