A(n) ____ is a type of methodology commonly used to identify all the threats associated with a system.
A. attack pattern
B. qualitative assessment
C. quantitative assessment
D. attack tree
Answer: D
Computer Science & Information Technology
You might also like to view...
Information technology is the study of managing, processing, and retrieving information
Indicate whether the statement is true or false
Computer Science & Information Technology
____ is an email or IM-based scam designed to persuade you to reveal confidential information.
A. Sniffing B. Spamming C. Pharming D. Phishing
Computer Science & Information Technology
Can you change the order of effects after you have applied them to a clip?
What will be an ideal response?
Computer Science & Information Technology
The purpose of a(n) ____ is to accept data as input and transform the data in some manner to produce a specific result as an output.
A. opcode B. procedure C. algorithm D. program
Computer Science & Information Technology