____ involves the management of vulnerabilities that are known to exist, but that have not yet led to a security incident.

A. Proactive change
B. Preventive change
C. Detective change
D. Restrictive change


Answer: B

Computer Science & Information Technology

You might also like to view...

Explain how arrays are passed to methods as parameters.

What will be an ideal response?

Computer Science & Information Technology

A(n) ____________________ converts digital text into audio output.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

#include #include using namespace std; const double Pi = 3.141592654;

What will be an ideal response?

Computer Science & Information Technology

Traditional code was written in non-procedural programming languages such as Java, which required a programmer to create a command for each processing step.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology