Critical Thinking Questions 12-1
?
George's firm contracts to provide risk management services for a wide range of smaller companies that cannot provide the service for themselves. One of George's responsibilities at the end of each month is to review the threats encountered by the companies and put them into the appropriate categories.
Another of George's clients has software that is outdated and has become increasingly vulnerable to attack. How does George categorize this threat?
A. Human error
B. Technical obsolescence
C. Service failure
D. Espionage
Answer: B
You might also like to view...
A(n) ________ can be an arrow, square, circle, text box, or a graphical element of a flow chart just to name a few
Fill in the blank(s) with correct word
Consider a relational schema R(A, B, C, D, E) with the following functional dependencies: A ? B, BC ? E, and ED ? A.
(a) List all keys of R. (b) Is R in 3NF? (c) Is R in BCNF?
A technician notices that there are two appointments scheduled for the same time. Which of the following should the technician do to resolve the issue?
A. Call one of the clients and apologize, then reschedule B. Do not go to the second scheduled appointment C. Email each client for rescheduling D. Go to the first scheduled appointment then after completion go to the next
The term ____________ is often used to indicate where an identifier has meaning and can be used
Fill in the blank(s) with the appropriate word(s).