The ____________________ control strategy attempts to reduce the impact caused by the exploitation of vulnerability through planning and preparation.
Fill in the blank(s) with the appropriate word(s).
mitigation
Computer Science & Information Technology
You might also like to view...
What word is interchangeable with computer?
a. processor b. desktop c. personal d. integrated circuit
Computer Science & Information Technology
Unlike a default field value, a placeholder is not stored in the data field and is not sent to the server as a field value.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Modern photographers use Photoshop to optimize the ____ of photographic images.
a. color b. contrast c. composition d. all of the above
Computer Science & Information Technology
IT professionals generally work ________ hours per week and on-call than people in other professions.
A. significantly fewer B. significantly more C. about the same D. exactly the same
Computer Science & Information Technology