Which of the following is a diagram showing a hierarchy of threats or vulnerabilities?
A) Spoofing B) Denial of Service C) Repudiation D) Threat tree
D
Computer Science & Information Technology
You might also like to view...
Match the following parts of an e-mail to their meaning:
I. subject line II. signature block III. salutation IV. closing V. body A. single-spaced paragraphs that are brief and relevant B. a courteous recognition with which you begin a message C. sender's name and contact information D. short description of the content of the e-mail message E. should match the beginning of the message
Computer Science & Information Technology
The Snipping Tool can only be used in the desktop environment
Indicate whether the statement is true or false
Computer Science & Information Technology