Which of the following is a diagram showing a hierarchy of threats or vulnerabilities?

A) Spoofing B) Denial of Service C) Repudiation D) Threat tree

D

Computer Science & Information Technology

You might also like to view...

Match the following parts of an e-mail to their meaning:

I. subject line II. signature block III. salutation IV. closing V. body A. single-spaced paragraphs that are brief and relevant B. a courteous recognition with which you begin a message C. sender's name and contact information D. short description of the content of the e-mail message E. should match the beginning of the message

Computer Science & Information Technology

The Snipping Tool can only be used in the desktop environment

Indicate whether the statement is true or false

Computer Science & Information Technology