Critical Thinking Questions 12-1
?
George's firm contracts to provide risk management services for a wide range of smaller companies that cannot provide the service for themselves. One of George's responsibilities at the end of each month is to review the threats encountered by the companies and put them into the appropriate categories.
Another of George's clients has software that is outdated and has become increasingly vulnerable to attack. How does George categorize this threat?

A. Human error
B. Technical obsolescence
C. Service failure
D. Espionage


Answer: B

Computer Science & Information Technology

You might also like to view...

A(n) ________ can be an arrow, square, circle, text box, or a graphical element of a flow chart just to name a few

Fill in the blank(s) with correct word

Computer Science & Information Technology

Consider a relational schema R(A, B, C, D, E) with the following functional dependencies: A ? B, BC ? E, and ED ? A.

(a) List all keys of R. (b) Is R in 3NF? (c) Is R in BCNF?

Computer Science & Information Technology

A technician notices that there are two appointments scheduled for the same time. Which of the following should the technician do to resolve the issue?

A. Call one of the clients and apologize, then reschedule B. Do not go to the second scheduled appointment C. Email each client for rescheduling D. Go to the first scheduled appointment then after completion go to the next

Computer Science & Information Technology

The term ____________ is often used to indicate where an identifier has meaning and can be used

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology