Which of the following is a type of action that has the potential to cause harm?

A. asset
B. vulnerability
C. threat
D. threat agent


Answer: C

Computer Science & Information Technology

You might also like to view...

Recursion is often less efficient than iteration because ________.

a. it can cause an explosion of method calls. b. it is not as intuitive. c. recursive methods are harder to debug. d. recursive methods take longer to program.

Computer Science & Information Technology

Variables should be declared as fields only if ________.

a. they are local variables b. they are used only within a method c. they are required for use in more than one method or their values must be saved between calls to the class’s methods d. they are arguments

Computer Science & Information Technology

Match the following terms to their appropriate arguments in the InStr function:

I. start A. To begin searching after the first character of a text string II. stringexpr1 B. Defined with the symbol or character being searched III. stringexpr2 C. Used to change the type of comparison being executed IV. compare (e.g. binary or textual) D. Defined with the field that contains the text data being searched

Computer Science & Information Technology

Floating-point numbers contain a fractional part and can be represented by the          data type.

a) frac b) real c) double d) None of the above.

Computer Science & Information Technology