A(n) ____ involves determining the damage that would result from an attack and the likelihood that a vulnerability is a risk to the organization.

A. threat modeling
B. risk assessment
C. attack tree
D. attack modeling


Answer: B

Computer Science & Information Technology

You might also like to view...

Which of the following is an antispyware program?

a. Gator b. RedSheriff c. Spy Sweeper d. NetBus

Computer Science & Information Technology

Certificates that you create yourself are considered ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

What two video card components can go bad and what error is displayed in each case?

What will be an ideal response?

Computer Science & Information Technology

A ____ is a darkened shade in an image.

A. shadow B. gamma C. pattern D. histogram

Computer Science & Information Technology