Which of the following is a tool that not only exposes threats to an organization, but points out strengths as well?
A) Denial of Service B) SWOT analysis C) Repudiation D) Threat tree
B
Computer Science & Information Technology
You might also like to view...
Out of the following list, which runtime complexity scales the worst?
a. O(1) b. O(n) c. O(n2) d. O(log n)
Computer Science & Information Technology
An SQL keyword defines the purpose and the structure of an SQL statement
Indicate whether the statement is true or false
Computer Science & Information Technology
What should you implement to prevent man-in-the-middle attacks against the Diffie-Hellman algorithm?
A. One-way hash B. Digital certificates C. Zero Knowledge Proof D. Private keys
Computer Science & Information Technology
A DNS zone that is stored and replicated across multiple domain servers is called a(n)__________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology