?In IT security terms, a _____ is the impact of an attack multiplied by the likelihood of a vulnerability being exploited.

A. ?proxy
B. ?risk
C. ?firewall
D. ?warning


Answer: B

Computer Science & Information Technology

You might also like to view...

Which if statement would be true if you needed to see if x (an int) was either 1 or 2?

A. if ( x == 1 || 2 ) B. if ( x =1 || 2 ) C. if ( x == 1 && x == 2 ) D. if( x == 1 || x == 2)

Computer Science & Information Technology

It is possible for Word to save a file as a Portable Document Format, PDF

Indicate whether the statement is true or false

Computer Science & Information Technology

The Page Editor Options command is located on the ____ menu.

A. Tools B. Insert C. Task Panes D. Format

Computer Science & Information Technology

The prosecution was trying to enter a document as evidence which would have a severely negative impact on the defense's case. The document was clearly related to the case at hand and was obviously obtained legally, morally, and ethically. Which of the following might be a circumstance that would force the judge to disallow the evidence without calling a lot of expert witnesses?

a. The evidence was not material. b. The evidence was contaminated. c. The evidence is not probative. d. Under the conditions described, there's little chance of getting the evidence disallowed.

Computer Science & Information Technology