____ is the process of tracking the assets.

A. Asset management
B. Risk identification
C. Threat management
D. Vulnerability identification


Answer: A

Computer Science & Information Technology

You might also like to view...

Which tool enables you to see all applications or programs currently running or to close an application that has stopped working?

A. System Monitor B. Event Viewer C. System Configuration D. Task Manager

Computer Science & Information Technology

An area that displays the workbook name, worksheet name, cell addresses, values, and formulas so you can monitor and examine formula calculations involving cells not immediately visible on the screen.

What will be an ideal response?

Computer Science & Information Technology

If the primary key of a table contains only a single field, the table is automatically in second normal form (2NF).

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The network ID and the host ID are combined to make a system's ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology