A(n) ____ involves determining the damage that would result from an attack and the likelihood that a vulnerability is a risk to the organization.
A. threat modeling
B. risk assessment
C. attack tree
D. attack modeling
Answer: B
Computer Science & Information Technology
You might also like to view...
Which of the following is an antispyware program?
a. Gator b. RedSheriff c. Spy Sweeper d. NetBus
Computer Science & Information Technology
Certificates that you create yourself are considered ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
What two video card components can go bad and what error is displayed in each case?
What will be an ideal response?
Computer Science & Information Technology
A ____ is a darkened shade in an image.
A. shadow B. gamma C. pattern D. histogram
Computer Science & Information Technology