Which of the following is NOT a facet of situational awareness?

A. the current status of devices
B. the impact of a situation on a device's status
C. factors that could negatively impact a device
D. data related to pending threats


D

Explanation: Although data related to pending threats would be useful, it is not considered to be part of situational awareness.

Computer Science & Information Technology

You might also like to view...

Which vulnerability follows the network in the vulnerability cycle?

A. client B. human/organization C. application D. service/server

Computer Science & Information Technology

The basic operations performed on a B-tree are search the tree, insert an item in the tree, delete an item from the tree, and ____.

A. rotate the tree B. balance the tree C. traverse the tree D. copy the tree

Computer Science & Information Technology

COGNITIVE ASSESSMENT Which of the following best describes the term bloatware?

A. Software that creates documents with unusually large file sizes B. A program that takes up most of a computer or devices RAM when it is running C. A script hidden inside a legitimate program that causes the computer to run slowly D. Additional hardware and apps installed by an OEM

Computer Science & Information Technology

____________________ enables individuals to create self-published, inexpensive Internet radio broadcasts in order to share their knowledge, express their opinions on particular subjects, or share original poems, songs, or short stories with interested individuals.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology