Which of the following is not one of the three risk management activities in the security management process?
A) Protections
B) Analysis
C) Measures
D) Plan
B) Analysis
Computer Science & Information Technology
You might also like to view...
The TCP normalization feature forwards abnormal packets to an administrator for further inspection.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
A(n) ____ is a predefined formula that performs simple or complex calculations.
A. function B. argument C. factor D. calculator
Computer Science & Information Technology
An id selector can be used to select several elements on a page.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
The ________ accesses a structure member via the structure variable name.
a) structure member operator b) structure pointer operator c) structure arrow operator d) none of these
Computer Science & Information Technology