A(n) ____ is a type of methodology commonly used to identify all the threats associated with a system.

A. attack pattern
B. qualitative assessment
C. quantitative assessment
D. attack tree


Answer: D

Computer Science & Information Technology

You might also like to view...

Information technology is the study of managing, processing, and retrieving information

Indicate whether the statement is true or false

Computer Science & Information Technology

____ is an email or IM-based scam designed to persuade you to reveal confidential information.

A. Sniffing B. Spamming C. Pharming D. Phishing

Computer Science & Information Technology

Can you change the order of effects after you have applied them to a clip?

What will be an ideal response?

Computer Science & Information Technology

The purpose of a(n) ____ is to accept data as input and transform the data in some manner to produce a specific result as an output.

A. opcode B. procedure C. algorithm D. program

Computer Science & Information Technology