_________ equals the probability of a successful attack multiplied by the expected loss from a successful attack plus an element of uncertainty.

A. Loss magnitude
B. Risk
C. Loss frequency
D. Loss

Answer: B

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1) The CompareTo method returns a positive number if the invoking string is less than the argument, a negative number if the invoking string is greater and a 0 if they are the same. 2) The StartsWith and EndsWith methods see if a string starts or ends with the given character or string. 3) The IndexOf method returns the indices of all occurrences of the given string. 4) Method LastIndexOf is used to find the last occurrence of given text in a string. 5) The LastIndexOfAny method scans through the array of characters backwards.

Computer Science & Information Technology

On single-processor systems, the operating system uses________to divide processor time among the many processes.

a) process slicing. b) time slicing. c) time splitting. d) None of the above

Computer Science & Information Technology