The ____________________ control strategy attempts to reduce the impact caused by the exploitation of vulnerability through planning and preparation.

Fill in the blank(s) with the appropriate word(s).


mitigation

Computer Science & Information Technology

You might also like to view...

What word is interchangeable with computer?

a. processor b. desktop c. personal d. integrated circuit

Computer Science & Information Technology

Unlike a default field value, a placeholder is not stored in the data field and is not sent to the server as a field value.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Modern photographers use Photoshop to optimize the ____ of photographic images.

a. color b. contrast c. composition d. all of the above

Computer Science & Information Technology

IT professionals generally work ________ hours per week and on-call than people in other professions.

A. significantly fewer B. significantly more C. about the same D. exactly the same

Computer Science & Information Technology